Skip to content

kushanb/identity-apps

 
 

Repository files navigation

WSO2 Identity Server Apps

End-user apps in WSO2 Identity Server

Branch Build Status
master Build Status

Setup build environment

  1. Install NodeJS from https://nodejs.org/en/download/.
  2. Install Maven from https://maven.apache.org/download.cgi.

Build & Run

Build

  1. Download or clone the project source code from https://github.com/wso2/identity-apps
  2. Run mvn clean install from the command line in the project root directory (where the root pom.xml is located).

If you are building product-is, the built identity apps dependencies will install to your local .m2 repository during the build above.

  1. Then you just need to build WSO2 Identiy Server after. (Follow the guide there)

Run

  1. Execute wso2server.sh (For unix environment) or wso2server.bat (For windows environment) file from the bin directory to run the WSO2 Identity Server.
  2. Navigate to https://localhost:9443/user-portal or https://localhost:9443/developer-portal from the browser. (Add certificate exception if required)

Run in dev mode

  1. Do only if you skip WSO2 Identity Server build step above: Download the built distribution of WSO2 Identity Server from https://wso2.com/identity-and-access-management/.
  2. Add below code to repository/resources/conf/templates/repository/conf/tomcat/web.xml.j2 in WSO2 Identity Server distribution pack to allow CORS.
    <filter>
        <filter-name>CORS</filter-name>
        <filter-class>com.thetransactioncompany.cors.CORSFilter</filter-class>
        <init-param>
            <param-name>cors.allowOrigin</param-name>
            <param-value>https://localhost:9000, https://localhost:9001, https://localhost:9002</param-value>
        </init-param>
        <init-param>
            <param-name>cors.supportedMethods</param-name>
            <param-value>GET, HEAD, POST, DELETE, OPTIONS, PATCH, PUT</param-value>
        </init-param>
        <init-param>
                   <param-name>cors.exposedHeaders</param-name>
                   <param-value>Location</param-value>
        </init-param>
    </filter>

    <filter-mapping>
        <filter-name>CORS</filter-name>
        <url-pattern>/*</url-pattern>
        <dispatcher>REQUEST</dispatcher>
        <dispatcher>FORWARD</dispatcher>
    </filter-mapping>
  1. Add your hostname and port as a trusted FIDO2 origin in repository/resources/conf/templates/repository/conf/identity/identity.xml.j2 as given below.
   <FIDO>
        <WebAuthn>
            <Enable>{{fido.webauthn.enable}}</Enable>
        </WebAuthn>
        <FIDO2TrustedOrigins>
            {% for origin in fido.trusted.origins %}
            <Origin>{{origin}}</Origin>
            {% endfor %}
            <Origin>https://localhost:9000</Origin>
        </FIDO2TrustedOrigins>
   </FIDO>
  1. Execute wso2server.sh (For unix environment) or wso2server.bat (For windows environment) file from the bin directory to run WSO2 Identity Server.
  2. Navigate to https://localhost:9443/carbon/ from the browser, and login to the system by entering an admin password.

Hint! Can find out the default password details here: https://docs.wso2.com/display/ADMIN44x/Configuring+the+System+Administrator

  1. In the system, navigate to Service Providers -> List from left side panel. And then go to Edit option in USER_PORTAL application. Then click on Inbound Authentication Configuration -> OAuth/OpenID Connect Configuration -> Edit. And then update the Callback Url field with below value.
regexp=(https://localhost:9443/user-portal/login|https://localhost:9443/user-portal/logout|https://localhost:9000/user-portal/login|https://localhost:9000/user-portal/logout)
  1. Similarly, update the callback urls of the DEVELOPER_PORTAL & ADMIN_PORTAL applications to the following.
regexp=(https://localhost:9443/developer-portal/login|https://localhost:9443/developer-portal/logout|https://localhost:9001/developer-portal/login|https://localhost:9001/developer-portal/logout)
regexp=(https://localhost:9443/admin-portal/login|https://localhost:9443/admin-portal/logout|https://localhost:9002/admin-portal/login|https://localhost:9002/admin-portal/logout)
  1. Open cloned or downloaded Identity Apps repo and Run npm run build from the command line in the project root directory (where the package.json is located) to build all the packages with dependencies. (Note:- Not necessary if you have already done above identity apps build steps)
  2. Start the apps in development mode, Execute cd apps/<app> && npm start command. E.g. cd apps/user-portal && npm start.
  3. Once the app is successfully started, you can access the via the URLs https://localhost:9000/user-portal, https://localhost:9001/developer-portal or https://localhost:9002/admin-portal.

Reporting Issues

We encourage you to report issues, improvements and feature requests regarding the project through GitHub Issue Tracker.

Important: And please be advised that, security issues must be reported to [email protected], not as GitHub issues, in order to reach proper audience. We strongly advise following the WSO2 Security Vulnerability Reporting Guidelines when reporting the security issues.

License

Licenses this source under the Apache License, Version 2.0 (LICENSE), You may not use this file except in compliance with the License.

About

No description, website, or topics provided.

Resources

License

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages

  • TypeScript 76.1%
  • JavaScript 11.7%
  • Java 8.6%
  • CSS 2.9%
  • Other 0.7%