Re: [Architecture] Dropping Unregistered Scope(s) from OAuth Request in IS.

2020-03-10 Thread Johann Nallathamby
Hi Sarubi, As Asela pointed out there are use cases for differentiating the access token not just based on client or user or registered scopes but based on other environmental attributes. The easiest way of representing these environmental attributes in OAuth2 and getting unique access tokens in

Re: [Architecture] [IAM] Supporting email verification when user’s email address is updated

2020-01-18 Thread Johann Nallathamby
Hi Malithi, Hi Ajanthan, OK. So if we think like that, how do you propose we do 2FA for security question update? Are you implying that we initiate a SSO flow with higher requested assurance level, so that in IS a step-up authentication is performed and returned back to the service provider, to

Re: [Architecture] [IAM][IS 5.10.0] REST APIs For Federated Associations Of The User

2020-01-02 Thread Johann Nallathamby
Hi Tharindu, Currently we have the capability where an admin can link federated accounts to local accounts using an admin services [1]. Does this mean that we are going to not support this in the Rest APIs? Recently we did a POC for a prospect where we had to load the account mappings to the

Re: [Architecture] [IAM] Supporting email verification when user’s email address is updated

2020-01-01 Thread Johann Nallathamby
Hi Malithi, I still think Isura has a valid requirement which is not captured in your response above. What Isura is explaining is not a notification flow; rather a 2FV flow. For example, consider the following use case. If I have to update my challenge question answers, I have to first do a 2FV

Re: [Architecture] [Dev] Binding access token to the browser for new IAM Portal Applications

2019-10-30 Thread Johann Nallathamby
Hi Darshana, On Sat, Sep 28, 2019 at 8:29 PM Darshana Gunawardana wrote: > Hi Johann, > > On Sat, Sep 21, 2019 at 10:43 AM Johann Nallathamby > wrote: > >> Hi Thanuja, >> >> Did we consider sending the access token itself as a secure, http-only >> c

Re: [Architecture] [Dev] Binding access token to the browser for new IAM Portal Applications

2019-10-30 Thread Johann Nallathamby
Hi Prakhash, On Mon, Sep 23, 2019 at 4:34 PM Prakhash Sivakumar wrote: > Hi Johann, > > On Sat, Sep 21, 2019 at 7:13 AM Johann Nallathamby > wrote: > >> Hi Thanuja, >> >> Did we consider sending the access token itself as a secure, http-only >> c

Re: [Architecture] [APIM 3.x.x] Supporting Cookie Based Access Tokens for APIs

2019-09-04 Thread Johann Nallathamby
> 3.x.x store/publisher. >> >> I'm a bit unclear on what do you mean by *"other APIs". * >> >> On Wed, Sep 4, 2019 at 10:47 AM Johann Nallathamby >> wrote: >> >>> Hi APIM Team, >>> >>> Protecting access tokens in SPAs has been a c

Re: [Architecture] [APIM 3.x.x] Supporting Cookie Based Access Tokens for APIs

2019-09-04 Thread Johann Nallathamby
Jaggery layer for the Store/Publisher Rest APIs. Those also can be proxied through the API Gateway and get the same protection mechanism. Thanks & Regards, Johann. > On Wed, Sep 4, 2019 at 10:47 AM Johann Nallathamby > wrote: > >> Hi APIM Team, >> >> Protecting a

[Architecture] [APIM 3.x.x] Supporting Cookie Based Access Tokens for APIs

2019-09-03 Thread Johann Nallathamby
Hi APIM Team, Protecting access tokens in SPAs has been a complicated affair. Though there hasn't been a standard solution pattern for this problem, a cookie based protection approach is what most vendors follow. With APIM 3.x.x we are supporting cookie based access tokens to protect the API

Re: [Architecture] [IAM] - Implementing SAML2 Federated IdP Initiated Logout

2019-08-16 Thread Johann Nallathamby
Just a suggestion to think about: As we are introducing a completely new aspect to IS which is to handle logout requests from federated IdP, isn't it much more cleaner in the code level to have this as a completely new endpoint instead of mixing it up with the existing /commonauth endpoint? I am

Re: [Architecture] Force Retry Mechanism per Step in Adaptive Authentication

2019-08-11 Thread Johann Nallathamby
alan Kanagalingam Please correct me if I'm > wrong. > > Regards, > Vihanga. > > On Mon, Jul 22, 2019 at 12:10 PM Johann Nallathamby > wrote: > >> I think we are confusing on the terms here. >> 1. "Retrying" is about allowing the user to retry authenti

[Architecture] [APIM] Supporting the Additional OAuth2 Service Provider Configurations in API Store

2019-07-30 Thread Johann Nallathamby
APIM Team, We have some additional OAuth2 service provider configurations that are seen in management console, but not in API Store. When do we plan to support these in the API Store? 1. PKCE - This is a de facto standard now for mobile app security. 2. Access/refresh/id token expiry times. 3.

Re: [Architecture] Force Retry Mechanism per Step in Adaptive Authentication

2019-07-22 Thread Johann Nallathamby
t;>> >> Yes, the requirement is to force to execute the step even though the step >> is successfully authenticated. >> >> >> Thanks, >> Senthalan >> >>> >>> Regards, >>> >>> On Sun, Jul 21, 2019, 8:14 AM Isha

Re: [Architecture] [Dev][IAM] Moving File Based Artifacts to Artifact Store

2019-07-07 Thread Johann Nallathamby
and still have configurations along with artifacts? Sorry if I am asking too many questions, but just want to be able to convince myself that we are doing the right thing here once and for all :) Thanks & Regards, Johann. > > Hence +1 to treat > >- Persist data as a blob (marshalled to

Re: [Architecture] [Dev][IS] Rest API for scopes

2019-07-07 Thread Johann Nallathamby
Hi Janak, Thanks for brining this up. I also noticed this recently when I was doing some demo for a customer and was planning to send a mail on this. When we did the OIDC scopes management feature we should have addressed the OAuth2 scopes management as well. I searched back to see if there has

Re: [Architecture] Common DataStore to handle connector related temporary data

2019-07-06 Thread Johann Nallathamby
Hi Isuranga, Was this resolved? There are two such tables I can think of. SessionDataStore which has a BLOB field and IDN_RECOVERY_DATA (names don't suit in both cases). Also I found a table called IDN_IDENTITY_USER_DATA which I am not sure what it does. One of these tables should satisfy your

Re: [Architecture] [Dev][IAM] Moving File Based Artifacts to Artifact Store

2019-07-03 Thread Johann Nallathamby
Ignore the question Isura, I think Ruwan's reply contains the answer. Regards, Johann. On Thu, Jul 4, 2019 at 8:48 AM Johann Nallathamby wrote: > Hi Isura, > > On Fri, Jun 7, 2019 at 9:16 AM Isura Karunaratne wrote: > >> >> >> On Wed, Jun 5, 2019 at 9:34 AM Ru

Re: [Architecture] [Dev][IAM] Moving File Based Artifacts to Artifact Store

2019-07-03 Thread Johann Nallathamby
uot;environment variable" binding >> logic, to get proper support for environment to environment promotion of >> artifacts. yet, it can be done with a separate effort than this IMO. >> >> Hence +1 to treat >> >>- Persist data as a blob (marshalled t

Re: [Architecture] JWT Authentication for API Gateway

2019-06-28 Thread Johann Nallathamby
Hi Chamod, How about supporting 3rd party Key Manager generated JWT access tokens? Will that work? 'jti' is an optional field as I remember. How would caching be impacted in that case? On Fri, Jun 28, 2019 at 10:47 AM Harsha Kumara wrote: > > > On Fri, Jun 28, 2019 at 10:43 AM Harsha Kumara

[Architecture] [IAM] Discussion point on Federated Account Linking

2019-06-10 Thread Johann Nallathamby
*Meeting Notes - 30/5/2019* During the meeting for [1], we also identified some federated account linking improvements that are currently not supported in WSO2 IS. A single physical user may have a set of linked local accounts in WSO2 Identity Server. The same physical user may have one or more

Re: [Architecture] [IAM] What is our Strategy on Local Account Linking?

2019-06-10 Thread Johann Nallathamby
it. Thanks & Regards, Johann. On Fri, Apr 19, 2019 at 6:06 PM Johann Nallathamby wrote: > > > On Thu, Apr 18, 2019 at 6:51 PM Ruwan Abeykoon wrote: > >> Hi Johann, >> +1 for implementing the use-case. >> We need to have a white-board session to capture all

Re: [Architecture] [Dev][IAM] Moving File Based Artifacts to Artifact Store

2019-06-04 Thread Johann Nallathamby
+1 to get rid of the artifacts for user stores. I think this was a wrong decision we made early on. On Tue, Jun 4, 2019 at 1:19 PM Hasanthi Purnima Dissanayake < hasan...@wso2.com> wrote: > Hi All, > > *Problem * > Currently, some artifacts like userstores , tenants' data, etc are stored > in

Re: [Architecture] [IAM] Scope Mapping for OpenID Connect Federated Authenticator

2019-06-03 Thread Johann Nallathamby
On Mon, Jun 3, 2019 at 6:25 PM Johann Nallathamby wrote: > > > On Mon, Jun 3, 2019 at 5:29 PM Asela Pathberiya wrote: > >> >> >> On Mon, Jun 3, 2019 at 12:22 PM Johann Nallathamby >> wrote: >> >>> Hi Asela, >>> >>>

Re: [Architecture] [IAM] Scope Mapping for OpenID Connect Federated Authenticator

2019-06-03 Thread Johann Nallathamby
On Mon, Jun 3, 2019 at 5:29 PM Asela Pathberiya wrote: > > > On Mon, Jun 3, 2019 at 12:22 PM Johann Nallathamby > wrote: > >> Hi Asela, >> >> As of now I see 2 potential use cases for scope mappings. >> >> 1. There are two different RPs in an or

Re: [Architecture] [IAM] Supporting Email or Mobile as the Preferred Communication Channel for the User

2019-06-03 Thread Johann Nallathamby
On Mon, Jun 3, 2019 at 1:05 PM Asela Pathberiya wrote: > > > On Thu, May 23, 2019 at 3:48 PM Asela Pathberiya wrote: > >> >> >> On Thu, May 23, 2019 at 3:00 PM Johann Nallathamby >> wrote: >> >>> *Problem* >>> >>

Re: [Architecture] [IAM] Scope Mapping for OpenID Connect Federated Authenticator

2019-06-03 Thread Johann Nallathamby
s mapped to the requested scopes. If we have a > scope mapping between IS and OP, then we can restrict requesting only the > mapped scopes from the external IDP. > > @Johann Nallathamby Do you have see any other concerns? > > So we can overcome that limitation with the

[Architecture] [IAM] Supporting Description and Internationalization for OAuth2 Scopes

2019-06-03 Thread Johann Nallathamby
The OAuth2 scopes implementation in IS doesn't support providing a human readable description that can be shown in to the end-user when providing consent. Just showing the scope names doesn't help the end-user to decide whether to grant the scope or not. The description should also support

Re: [Architecture] [IAM] Scope Mapping for OpenID Connect Federated Authenticator

2019-06-03 Thread Johann Nallathamby
of scopes. Thanks & Regards, Johann. On Fri, May 31, 2019 at 9:43 AM Asela Pathberiya wrote: > > > On Fri, May 31, 2019 at 7:58 AM Johann Nallathamby > wrote: > >> *Problem* >> >> When we federate to other OpenID Connect Providers, we can send scope >>

Re: [Architecture] [IAM] Remember me device management

2019-06-01 Thread Johann Nallathamby
Hi Godwin, I think the consent management framework in IS is only meant to manage consent receipts and not the data related to the consent transaction. So I have an alternative proposal which combines solution 1 and 3 above. What if we manage the remember device consents through the consent

[Architecture] [IAM] Scope Mapping for OpenID Connect Federated Authenticator

2019-05-30 Thread Johann Nallathamby
*Problem* When we federate to other OpenID Connect Providers, we can send scope values. However, currently the scope values are fixed per OP we define in IS. This works fine if the service provider is not a OpenID Connect RP or an RP not requesting scopes. If we are to support different scope

Re: [Architecture] Fwd: Basic Authentication for APIM Gateway

2019-05-30 Thread Johann Nallathamby
basic authentication and pass that token to >> the subsequent handlers? >> >> Thanks, >> Chanaka >> >> On Wed, Mar 27, 2019 at 1:33 PM Johann Nallathamby >> wrote: >> >>> [+Roberto Monteiro ,+Fabio Gonçalves >>> ,+Joao >>&g

Re: [Architecture] [IAM] Supporting Email or Mobile as the Preferred Communication Channel for the User

2019-05-28 Thread Johann Nallathamby
IMO this is the most practical way in >users perspective. > > This can be solved with user claim as described earlier. Regards, Johann. > Thanks, > Hasanthi > > >> >> >> >>> On Thu, May 23, 2019 at 3:48 PM Asela Pathberiya wrote:

[Architecture] [IAM] Supporting Dynamic Roles using XACML in WSO2 Identity Server

2019-05-27 Thread Johann Nallathamby
IAM Team, Lately I've been thinking of a way to support dynamic roles in WSO2 IS. What triggered me was, we already have a tool to author dynamic role policies with XACML, albeit its shortcomings. Moreover the limitations in the tool is an orthogonal problem to this use case I believe. What is

[Architecture] [IAM] Supporting Email or Mobile as the Preferred Communication Channel for the User

2019-05-23 Thread Johann Nallathamby
*Problem* IS currently supports different types of communication channels in the products with the use of output event adaptor such as Email, SMS, HTTP, etc. However currently there can be only one channel selected for a given deployment based on the configuration. We have a customer requirement

Re: [Architecture] [IAM] Can't do Step-up Authentication for Untrusted 3rd Party Service Providers

2019-04-24 Thread Johann Nallathamby
Thanks for the clarification Pulasthi. Just to add a bit more explanation to Pulasthi's answers, On Wed, Apr 24, 2019 at 12:56 AM Pulasthi Mahawithana wrote: > Hi Johann, > > On Fri, Apr 19, 2019 at 6:26 PM Johann Nallathamby > wrote: > >> *[+architecture]* >> &

Re: [Architecture] [IAM] Can't do Step-up Authentication for Untrusted 3rd Party Service Providers

2019-04-19 Thread Johann Nallathamby
*[+architecture]* Hi Ruwan, As mentioned in my original mail, I am calling them "untrusted", because they are 3rd parties to IS, and we can't guarantee that they will send authentication requests in a way we want them to send under a particular scenario. For example, one of the SCA

Re: [Architecture] [IAM] Can't do Step-up Authentication for Untrusted 3rd Party Service Providers

2019-04-19 Thread Johann Nallathamby
*[+architecture]* Hi Pulasthi, On Fri, Apr 19, 2019 at 1:36 AM Pulasthi Mahawithana wrote: > Hi Johann, > > I think if there is an existing session we don't even go into the >> authentication phase for the adaptive authentication script to be executed. >> > > This is not really the case. The

Re: [Architecture] [IAM] What is our Strategy on Local Account Linking?

2019-04-19 Thread Johann Nallathamby
quirements. However, we can propose an option how we plan to support it, either via extension or WUM. Probably this will be on IS 5.8.0. What I am more keen on deciding is, how we can support this OOTB beyond IS 5.8.0. Regards, Johann. > > Cheers, > Ruwan A > > > On Thu, Apr 18

Re: [Architecture] [IAM] What is our Strategy on Local Account Linking?

2019-04-19 Thread Johann Nallathamby
dules to be touched. >> >> Can we do this once the release pressure is over? For the prospect, can >> we say this is in our roadmap. >> >> Cheers, >> Ruwan A >> >> >> On Thu, Apr 18, 2019 at 4:45 PM Johann Nallathamby >> wrote: >> >&

Re: [Architecture] [IAM] Can't do Step-up Authentication for Untrusted 3rd Party Service Providers

2019-04-18 Thread Johann Nallathamby
+Pulasthi Mahawithana for his input. On Thu, Apr 18, 2019 at 5:56 AM Johann Nallathamby wrote: > In fact the requirement is not only for step-up authentication but also > just to force username/password authentication authentication based on > policy in IS. > > Thanks &

[Architecture] [IAM] What is our Strategy on Local Account Linking?

2019-04-18 Thread Johann Nallathamby
IAM Team, I know we just have a facility to store and manage linked local accounts. However we don't use it anywhere. There have been many customers and/or leads in the past who have requested for this capability for different kinds of requirements and mostly we've provided extensions but never

Re: [Architecture] [IAM] Can't do Step-up Authentication for Untrusted 3rd Party Service Providers

2019-04-18 Thread Johann Nallathamby
In fact the requirement is not only for step-up authentication but also just to force username/password authentication authentication based on policy in IS. Thanks & Regards, Johann. On Thu, Apr 18, 2019 at 5:32 AM Johann Nallathamby wrote: > IAM Team, > > The requirement is

[Architecture] [IAM] Can't do Step-up Authentication for Untrusted 3rd Party Service Providers

2019-04-18 Thread Johann Nallathamby
IAM Team, The requirement is to do step-up authentication using adaptive authentication script on IS side for an untrusted 3rd party service provider. What I mean by untrusted is that, we can't rely on the service provider to send LOA values or force authentication requests. It should be

Re: [Architecture] Auth0 Authenticator Using SMS notification For IS

2019-04-10 Thread Johann Nallathamby
Did this implementation continue after this? I also think Ruwan's question is a valid one. Thanks & Regards, Johann. On Fri, Jan 18, 2019 at 1:30 PM Ruwan Abeykoon wrote: > Hi Folks, > I am OK to support Auth0 as federated IdP and supporting WSO2 as federated > IdP to Auth0. > I am

Re: [Architecture] [APIM][EI] Kerberos Delegation on WSO2 Gateway is now Supported!!

2019-04-06 Thread Johann Nallathamby
lop some > mediator/handler or even extended keymanager. > > Is it possible to get access to the code through some repository ? > > Cheers > Cyril > > Le ven. 5 avr. 2019 à 19:27, Johann Nallathamby a > écrit : > >> Hi All, >> >> We'v

[Architecture] [APIM][EI] Kerberos Delegation on WSO2 Gateway is now Supported!!

2019-04-05 Thread Johann Nallathamby
Hi All, We've been working on an implementation to support Kerberos constrained and unconstrained delegation on WSO2 Gateway. We've now successfully integrated Java and .NET Kerberos clients, with a Kerberos protected .NET service running on IIS, through WSO2 API Gateway, using constrained and

Re: [Architecture] [IAM] Problems Discovered in Consent Management in WSO2 IS

2019-03-27 Thread Johann Nallathamby
Hi All, Please find the Github issues created as below. On Mon, Mar 25, 2019 at 1:17 PM Johann Nallathamby wrote: > IAM Team, > > I recently had to do a presentation/demo to a customer on GDPR support in > WSO2 IS. Following are the usability problems I've come across in the >

Re: [Architecture] Fwd: Basic Authentication for APIM Gateway

2019-03-27 Thread Johann Nallathamby
, Mar 8, 2019 at 3:20 AM Harsha Kumara wrote: >>>>> >>>>>> Is your requirement is to provide basic authentication via clientId >>>>>> and clientSecret? For the microgateway, it will required to validate the >>>>>> this by connecting to

[Architecture] [IAM] Problems Discovered in Consent Management in WSO2 IS

2019-03-25 Thread Johann Nallathamby
IAM Team, I recently had to do a presentation/demo to a customer on GDPR support in WSO2 IS. Following are the usability problems I've come across in the latest version. Would like to get your feedback on this. 1. In all the webinars we've done on GDPR, we talk about IS as a consent repository

Re: [Architecture] Fwd: Basic Authentication for APIM Gateway

2019-03-08 Thread Johann Nallathamby
he microgateway, it will required to validate the this >> by connecting to the key manager and bring the throttling information and >> etc which will require another API. Else at micro gateway it will required >> to generate a token using clientd and secret and resume the flow. >

Re: [Architecture] [APIM] Supporting 3rd Party Key Manager Integrations at API Gateway

2019-03-08 Thread Johann Nallathamby
Key Manager profile. The only downside of this approach is >> that you would need to run the gateway in the default profile. Which I >> think is a good trade off rather than complicating the product than it >> already is. >> >> Thanks, >> NuwanD. >> >>

Re: [Architecture] [APIM] Supporting 3rd Party Key Manager Integrations at API Gateway

2019-03-08 Thread Johann Nallathamby
all to the key manager in option 1 above. We can also add scope validation to our guideline of when to propose key manager extension. Thanks & Regards, Johann. > > On Thu, Mar 7, 2019 at 12:54 AM Johann Nallathamby > wrote: > >> APIM Team, >> >> I would like to under

Re: [Architecture] Fwd: Basic Authentication for APIM Gateway

2019-03-07 Thread Johann Nallathamby
*[sending this mail again because previous one wasn't copied to architecture@wso2.org ]* Hi Nuwan, Hi Harsha, Hi Chamod, An additional thought here. Most of the times customers who ask for basic authentication support are the customers who need to support legacy external applications I believe;

[Architecture] [APIM] Supporting 3rd Party Key Manager Integrations at API Gateway

2019-03-06 Thread Johann Nallathamby
APIM Team, I would like to understand what was the original reason we went with a 3rd party key manager extension in our key manager component, rather than giving the extensibility to integrate a 3rd party key manager at the gateway itself. What are the problems in supporting 3rd party Key

[Architecture] [IAM] Validating Scopes during Access Token Issuing Phase

2019-03-05 Thread Johann Nallathamby
IAM Team, We've implemented XACML based scope authorization during access token validation phase. However, it is also important to do this authorization during authorization_code, access_token, refresh_token and id_token, issuing phase IMO. Especially for self-contained token use cases, we need

Re: [Architecture] [APIM] Cannot secure APIs with Mutual TLS and OAuth2

2019-03-05 Thread Johann Nallathamby
cture] OAuth clients based on a trusted CA" in architecture@wso2.org Thanks & Regards, Johann. On Tue, Mar 5, 2019 at 3:26 PM Johann Nallathamby wrote: > APIM Team, > > In API Manager it seems like if we check the option to secure APIs using > Mutual TLS security AND OAu

[Architecture] [APIM] Cannot secure APIs with Mutual TLS and OAuth2

2019-03-05 Thread Johann Nallathamby
APIM Team, In API Manager it seems like if we check the option to secure APIs using Mutual TLS security AND OAuth2 security for APIs, API Manager checks if either of the mechanisms are in place. There is no way to enforce both on an API. There are good number of customers who want to enforce both

[Architecture] [IAM][New Feature] Claim Transformation for Provisioning Use Cases

2019-02-19 Thread Johann Nallathamby
IAM Team, I don't intend to talk about the importance of the claim transformations during provisioning use cases. Currently to support such cases, we propose to write custom provisioning connectors or JIT provisioning handlers. However, I was thinking it would be slick to have a scripting editor

[Architecture] [IAM] Avoiding asking for Tenant Domain in Login Page for Non-SaaS Service Providers

2018-11-27 Thread Johann Nallathamby
IAM Team, What do you think of the $subject? Basically if its a Non-SaaS service provider, the login is restricted to users of the same tenant domain. In some cases the users are not even aware of their tenancy. In such cases it may not be practical to ask for the tenant from the user. The tenant

Re: [Architecture] [IAM] Additional Security for SAML2/JWT Bearer Assertion Grant Flows

2018-11-01 Thread Johann Nallathamby
Created https://github.com/wso2/product-is/issues/3897 Regards, Johann. On Thu, Nov 1, 2018 at 3:01 PM Prabath Siriwardena wrote: > +1 > > Can you please create a new feature request - so we will not miss this > > Thanks & regards > -Prabath > > On Thu, N

[Architecture] [IAM] Additional Security for SAML2/JWT Bearer Assertion Grant Flows

2018-11-01 Thread Johann Nallathamby
*Status Quo* Let's say there are two legitimate service providers A and B. Both A and B are registered in IdP X as SAML2 service providers. The only difference is A is enabled to exchange SAML2 assertion with WSO2 IS using SAML2 Bearer Assertion grant flow. To do this, WSO2 IS's token endpoint is

[Architecture] [APIM] Multiple types of Authentication Sequences for API Manager Applications

2018-10-22 Thread Johann Nallathamby
API Manager Team, I was thinking about $subject and it seems this is something we've never discussed extensively in architecture. However I know some customers who have asked for this. But I don't think we have consensus on what the proper user experience should be in API Manager. At least I am

Re: [Architecture] Implementing SAML ECP profile for WSO2 IS

2018-10-09 Thread Johann Nallathamby
the Google Groups > "WSO2 Engineering Group" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to engineering-group+unsubscr...@wso2.com. > For more options, visit https://groups.google.com/a/wso2.com/d/optout. > -- *Johann Dilanth

Re: [Architecture] [APIM][300][Store] Feature to change password of an user

2018-10-09 Thread Johann Nallathamby
>>>>>>>>>>>>>> - currentPassword >>>>>>>>>>>>>>> - newPassword >>>>>>>>>>>>>>> properties: >>>>>>>>>>>>>>>

Re: [Architecture] Implementing Identifier first in authentication flow

2018-08-17 Thread Johann Nallathamby
ingam* >> *Software Engineer - WSO2 Inc.* >> *Mobile : +94 (0) 77 18 77 466* >> <http://wso2.com/signature> >> > > > -- > Maduranga Siriwardena > Senior Software Engineer > WSO2 Inc; http://wso2.com/ > > Email: madura...@wso2.com > Mobi

Re: [Architecture] [IAM] PKCE based OAuth flow for Public Clients

2018-08-07 Thread Johann Nallathamby
;>> https://github.com/dilee/carbon-identity-framework/tree/feature-oauth-public-client >>> >>> Regards. >>> -- >>> *Dileesha Rajapakse* >>> Software Engineer | WSO2 Inc. >>> Mobile: +94 72555933 >>> http://www.dil

Re: [Architecture] [New Feature]: Cross Protocol IDP initiated SSO flow

2018-07-18 Thread Johann Nallathamby
On Wed, Jul 18, 2018 at 12:07 PM Farasath Ahamed wrote: > > > On Wed, Jul 18, 2018 at 7:27 AM, Johann Nallathamby > wrote: > >> Hi Dinali, >> >> *"IdP initiated SSO"* is something we already support between WSO2 IS >> and service providers reg

Re: [Architecture] [New Feature]: Cross Protocol IDP initiated SSO flow

2018-07-17 Thread Johann Nallathamby
Ltd. > Web: http://wso2.com/ > Email : gdrdabar...@gmail.com > LinkedIn <https://lk.linkedin.com/in/dinalidabarera> > Mobile: +94770198933 > > > > > <https://lk.linkedin.com/in/dinalidabarera> > > > > > > > > > > > > > &

[Architecture] [IAM] Implementing an Extension for Identity Management to work in Concert with Active Directory

2018-06-26 Thread Johann Nallathamby
ntha Nallathamby* Senior Lead Solutions Engineer WSO2, Inc. lean.enterprise.middleware Mobile: *+94 77 7776950* LinkedIn: *http://www.linkedin.com/in/johann-nallathamby <http://www.linkedin.com/in/johann-nallathamby>* Medium: *https://medium.com/@johann_nallathamby <https://medium.com/@johan

[Architecture] [IAM] Introducing New Claim Properties to Control Claims Shown in Different Views

2018-06-26 Thread Johann Nallathamby
hamby* Senior Lead Solutions Engineer WSO2, Inc. lean.enterprise.middleware Mobile: *+94 77 7776950* LinkedIn: *http://www.linkedin.com/in/johann-nallathamby <http://www.linkedin.com/in/johann-nallathamby>* Medium: *https://medium.com/@johann_nallathamby <https://medium.com/@johann_

[Architecture] [IAM] Outbound Provisioning Service Orchestration

2018-05-07 Thread Johann Nallathamby
. Others: Thoughts? What are your opinions on the two options? Thanks & Regards, Johann. -- *Johann Dilantha Nallathamby* Senior Lead Solutions Engineer WSO2, Inc. lean.enterprise.middleware Mobile: *+94 77 7776950* LinkedIn: *http://www.linkedin.com/in/johann-nallathamby <http://www.linke

Re: [Architecture] [IAM] Provisioning Users with Passwords when JIT Provisioning

2018-04-11 Thread Johann Nallathamby
aka Jayawardena* >> Software Engineer >> WSO2 Inc. >> >> Phone: +94 71 350 5470 >> LinkedIn : https://lk.linkedin.com/in/menakajayawardena >> Blog : https://menakamadushanka.wordpress.com/ >> >> > > > --

Re: [Architecture] [APIM v3] Base path for /userinfo endpoint

2018-03-29 Thread Johann Nallathamby
>>>> mobile : +94774078049 <%2B94772207163> >>>> >>>> >>> >>> >>> -- >>> Regards, >>> Uvindra >>> >>> Mobile: 33962 >>> >> >> >> >> -- >> Regards, >>

Re: [Architecture] [IAM] eIDAS profile support for SAML

2018-03-12 Thread Johann Nallathamby
o2.com> >> wrote: >> >>> If extensions are coming in the SAML AuthnRequest from the SP, then, >>> IIRC, that *same extension* will be copied to the AuthnRequest going to >>> the Federated IdP. Is that behaviour acceptable for this scenario? Please >>&

Re: [Architecture] [IAM] eIDAS profile support for SAML

2018-02-27 Thread Johann Nallathamby
iki/display/CEFDIGITAL/How+ > does+it+work+-+eIDAS+solution > [2] https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/ > 2016/12/16/eIDAS+Technical+Specifications+v.+1.1 > [3] https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf > > Thanks and Regards &g

Re: [Architecture] [IS 5.5.0] TLS Mutual Authentication for OAuth 2.0 clients

2018-02-20 Thread Johann Nallathamby
idating > certificate since it happens in the container level AFAIK. But we may need > to call to CRL and OCSP endpoints and validate the certificate. Again this > is an improvement and should be optional. > > On Wed, Feb 21, 2018 at 11:25 AM, Johann Nallathamby <joh...@wso2.com>

Re: [Architecture] [IS 5.5.0] TLS Mutual Authentication for OAuth 2.0 clients

2018-02-20 Thread Johann Nallathamby
-ietf-oauth-mtls-07#section-2.1 > [3] https://tools.ietf.org/html/rfc6749#section-2.2 > > Thanks, > Sathya > > -- > Sathya Bandara > Software Engineer > WSO2 Inc. http://wso2.com > Mobile: (+94) 715 360 421 <+94%2071%20411%205032> > > -- *Johann

Re: [Architecture] Support FIDP initiated logout with new identity framework

2018-02-07 Thread Johann Nallathamby
On Wed, Feb 7, 2018 at 2:33 PM, Malithi Edirisinghe <malit...@wso2.com> wrote: > > > On Wed, Feb 7, 2018 at 2:32 AM, Johann Nallathamby <joh...@wso2.com> > wrote: > >> It is in fact an inbound connector. So +1 to use the inbound framework >> and write a I

Re: [Architecture] OIDC request object support

2018-01-28 Thread Johann Nallathamby
Hi Hasanthi, On Thu, Jan 25, 2018 at 11:30 AM, Johann Nallathamby <joh...@wso2.com> wrote: > Hi Hasanthi, > > On Wed, Jan 24, 2018 at 11:14 PM, Hasanthi Purnima Dissanayake < > hasan...@wso2.com> wrote: > >> Hi Johann, >> >> First of all apolo

Re: [Architecture] OIDC request object support

2018-01-24 Thread Johann Nallathamby
nd if the specific requested OIDC claim, is defined in the >> OIDC dialect, the user has a value for that claim and s/he has approved >> that claim for the RP, then we can send them to the RP, regardless of >> whether it is defined in scope or not. Otherwise we are contradicting

Re: [Architecture] OIDC request object support

2018-01-24 Thread Johann Nallathamby
On Wed, Jan 24, 2018 at 2:12 PM, Farasath Ahamed <farasa...@wso2.com> wrote: > > > On Tuesday, January 23, 2018, Johann Nallathamby <joh...@wso2.com> wrote: > >> Hi Farasath, >> >> On Tue, Jan 23, 2018 at 12:13 PM, Farasath Ahamed <farasa...@wso2.com&

Re: [Architecture] OIDC request object support

2018-01-24 Thread Johann Nallathamby
Hi Hasanthi, On Tue, Jan 23, 2018 at 10:59 AM, Johann Nallathamby <joh...@wso2.com> wrote: > Hi Hasanthi, > > On Tue, Jan 23, 2018 at 9:31 AM, Hasanthi Purnima Dissanayake < > hasan...@wso2.com> wrote: > >> Hi Johann, >> >> Is there any instance i

Re: [Architecture] [RRT] XACML based scope validator (during OAuth2 token validation)

2018-01-23 Thread Johann Nallathamby
will be >> validated using JDBCScopeValidator and XACMLScopeValidator. >> The JDBCScopeValidator was already implemented. The XACMLScopeValidator >> will create an XACML request from access token and validate using >> EntitlementService. >> >> >> Thanks an

Re: [Architecture] Password Rotation Policy Authenticator

2018-01-23 Thread Johann Nallathamby
sers, not by WSO2. > > But there are problems in our WUM model when we do feature installation. > We need to work on this too. > > Cheers, > Ruwan > > On Tue, Jan 23, 2018 at 11:21 AM, Johann Nallathamby <joh...@wso2.com> > wrote: > >> >> >>

Re: [Architecture] OIDC request object support

2018-01-23 Thread Johann Nallathamby
Hi Farasath, On Tue, Jan 23, 2018 at 12:13 PM, Farasath Ahamed <farasa...@wso2.com> wrote: > > > On Tuesday, January 23, 2018, Johann Nallathamby <joh...@wso2.com> wrote: > >> Hi Hasanthi, >> >> On Tue, Jan 23, 2018 at 9:31 AM, Hasanthi Purnima

Re: [Architecture] Password Rotation Policy Authenticator

2018-01-22 Thread Johann Nallathamby
..@wso2.com> wrote: > >> Hi, >> >> *@Johann* Thank you for the information. I was able to extend the >> handler and listen to password change events. >> >> Now I am working on publishing data to IS Analytics using the >> EventStreamService. >> >

Re: [Architecture] OIDC request object support

2018-01-22 Thread Johann Nallathamby
service provider configuration must have at least 1 claim. Otherwise what will happen is for every service provider we need to add all the OIDC claims if they are going to request claims dynamically, using scopes or requested claims in the request. Do I make sense or am I missing something? Regards, Jo

Re: [Architecture] [IAM] [IS 5.5.0] Request Object persistance

2018-01-22 Thread Johann Nallathamby
;redirect_uri": "https://client.example.org/cb;, >"scope": "openid", >"state": "af0ifjsldkj", >"nonce": "n-0S6_WzA2Mj", >"max_age": 86400, >"claims": > { > "u

Re: [Architecture] [IAM] [IS 5.5.0] Request Object persistance

2018-01-22 Thread Johann Nallathamby
> > > -- > > Hasanthi Dissanayake > > Senior Software Engineer | WSO2 > > E: hasan...@wso2.com > M :0718407133| http://wso2.com <http://wso2.com/> > > ___ > Architecture mailing list > Architecture@wso2.org

Re: [Architecture] OIDC request object support

2018-01-22 Thread Johann Nallathamby
bove in the > request parameter. > > As we are planning to provide the implementation as a 5.3.0 WUM update the > 'acr' implementation will be not available there. So if 'acr' value is > requested as an essential claim a pre-def

Re: [Architecture] Federated IdP Initiated Logout

2018-01-20 Thread Johann Nallathamby
che.tomcat.util.net.NioEndpoint$SocketProcessor.doRun >>>>>>>> (NioEndpoint.java:1775) >>>>>>>> at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(N >>>>>>>> ioEndpoint.java:1734) >>>>>>>>

Re: [Architecture] Password Rotation Policy Authenticator

2018-01-17 Thread Johann Nallathamby
On Wed, Jan 17, 2018 at 12:43 PM, Nadun De Silva <nad...@wso2.com> wrote: > Hi Johann, > > On Tue, Jan 16, 2018 at 9:30 PM, Johann Nallathamby <joh...@wso2.com> > wrote: > >> Hi Nadun, >> >> On Tue, Jan 16, 2018 at 11:16 AM, Nadun De Silva <nad...@w

Re: [Architecture] Password Rotation Policy Authenticator

2018-01-16 Thread Johann Nallathamby
gt;>> >>>> <http://wso2.com/signature> >>>> >>> >>> >>> >>> -- >>> Dimuthu Leelarathne >>> Director, Solutions Architecture >>> >>> WSO2, Inc. (http://wso2.com) >>> email: dimut...@wso

Re: [Architecture] Password Rotation Policy Authenticator

2018-01-16 Thread Johann Nallathamby
>>>>>>> 502efeb1-cc59-4b62-a197-8c612797933c >>>>>>>> [2] https://docs.wso2.com/display/IS530/Password+History+Validation >>>>>>>> >>>>>>>> Thank you! >>>>>>>> >>>>>

Re: [Architecture] [RRT] XACML based scope validator (during OAuth2 token validation)

2018-01-16 Thread Johann Nallathamby
e role based policy you are talking and the role based scope validation we implemented in IS 5.4.0? Time based policies can be one of the additional policy templates we ship. Regards, Johann. > > [1] - https://github.com/wso2-extensions/identity-application-authz-xacml > > Regards,

Re: [Architecture] [RRT] XACML based scope validator (during OAuth2 token validation)

2018-01-15 Thread Johann Nallathamby
*[-IAM, RRT]* On Mon, Jan 15, 2018 at 8:13 PM, Johann Nallathamby <joh...@wso2.com> wrote: > Hi Senthalan, > > Did you check [1]? In this feature *@Isuranga* implement XACML policy to > evaluate the permission tree. For this he had to come up with a policy, > that defi

Re: [Architecture] [RRT] XACML based scope validator (during OAuth2 token validation)

2018-01-15 Thread Johann Nallathamby
gineer - WSO2 Inc.* >> *Mobile : +94 (0) 77 18 77 466* >> <http://wso2.com/signature> >> > > > > -- > > *Senthalan Kanagalingam* > *Software Engineer - WSO2 Inc.* > *Mobile : +94 (0) 77 18 77 466* > <http://wso2.com/signat

Re: [Architecture] [X509 Authenticator] Certificate Revocation Verification with CRL and OCSP

2017-12-18 Thread Johann Nallathamby
Hi Indunil, On Fri, Dec 15, 2017 at 7:32 AM, Indunil Upeksha Rathnayake < indu...@wso2.com> wrote: > Hi, > > At the time, a certificate is issued by a Certificate Authority (CA), it > is expected to be in use for its entire validity period. However, various > circumstances may cause a

Re: [Architecture] [X509 Authenticator] Certificate Revocation Verification with CRL and OCSP

2017-12-14 Thread Johann Nallathamby
Hi Indunil, On Fri, Dec 15, 2017 at 9:02 AM, Indunil Upeksha Rathnayake < indu...@wso2.com> wrote: > Hi, > > At the time, a certificate is issued by a Certificate Authority (CA), it > is expected to be in use for its entire validity period. However, various > circumstances may cause a

Re: [Architecture] REST API for resending confirmation code in account recovery and self registration scenarios

2017-12-09 Thread Johann Nallathamby
062 > > Thanks and Regards > > On Tue, Dec 5, 2017 at 10:56 AM, Indunil Upeksha Rathnayake < > indu...@wso2.com> wrote: > >> Hi, >> >> On Tue, Dec 5, 2017 at 9:03 AM, Johann Nallathamby <joh...@wso2.com> >> wrote: >> >>> Hi Induni

  1   2   3   >