End-user apps in WSO2 Identity Server
Branch | Build Status |
---|---|
master |
- Install NodeJS from https://nodejs.org/en/download/.
- Install Maven from https://maven.apache.org/download.cgi.
- Download or clone the project source code from https://github.com/wso2/identity-apps
- Run
mvn clean install
from the command line in the project root directory (where the rootpom.xml
is located).
If you are building product-is, the built identity apps dependencies will install to your local .m2
repository during the build above.
- Then you just need to build WSO2 Identiy Server after. (Follow the guide there)
- Execute
wso2server.sh
(For unix environment) orwso2server.bat
(For windows environment) file from thebin
directory to run the WSO2 Identity Server. - Navigate to
https://localhost:9443/user-portal
orhttps://localhost:9443/admin-portal
from the browser. (Add certificate exception if required)
- Do only if you skip WSO2 Identity Server build step above: Download the built distribution of WSO2 Identity Server from https://wso2.com/identity-and-access-management/.
- Add below code to
repository/resources/conf/templates/repository/conf/tomcat/web.xml.j2
inWSO2 Identity Server
distribution pack to allow CORS.
<filter>
<filter-name>CORS</filter-name>
<filter-class>com.thetransactioncompany.cors.CORSFilter</filter-class>
<init-param>
<param-name>cors.allowOrigin</param-name>
<param-value>https://localhost:9000, https://localhost:9001</param-value>
</init-param>
<init-param>
<param-name>cors.supportedMethods</param-name>
<param-value>GET, HEAD, POST, DELETE, OPTIONS, PATCH, PUT</param-value>
</init-param>
</filter>
<filter-mapping>
<filter-name>CORS</filter-name>
<url-pattern>/*</url-pattern>
<dispatcher>REQUEST</dispatcher>
<dispatcher>FORWARD</dispatcher>
</filter-mapping>
- Add your hostname and port as a trusted FIDO2 origin in
repository/resources/conf/templates/repository/conf/identity/identity.xml.j2
as given below.
<FIDO>
<WebAuthn>
<Enable>{{fido.webauthn.enable}}</Enable>
</WebAuthn>
<FIDO2TrustedOrigins>
{% for origin in fido.trusted.origins %}
<Origin>{{origin}}</Origin>
{% endfor %}
<Origin>https://localhost:9000</Origin>
</FIDO2TrustedOrigins>
</FIDO>
- Execute
wso2server.sh
(For unix environment) orwso2server.bat
(For windows environment) file from thebin
directory to run WSO2 Identity Server. - Navigate to
https://localhost:9443/carbon/
from the browser, and login to the system by entering an admin password.
Hint! Can find out the default password details here: https://docs.wso2.com/display/ADMIN44x/Configuring+the+System+Administrator
- In the system navigate to
Service Providers -> List
from left navigation. And then go toEdit
option inUSER_PORTAL
application. Then after toInbound Authentication Configuration -> OAuth/OpenID Connect Configuration -> Edit
. And then update theCallback Url
feild with below value.
regexp=(https://localhost:9443/user-portal/login|https://localhost:9443/user-portal/logout|https://localhost:9000/user-portal/login|https://localhost:9000/user-portal/logout)
- Open cloned or downloaded Identity Apps repo and Run
npm run build
from the command line in the project root directory (where thepackage.json
is located) to build all the packages with dependancies. (Note:- Not necessary if you have already done above identity apps build steps) - Start the apps in development mode, Execute
cd apps/<app> && npm start
command. E.g.cd apps/user-portal && npm start
.
We encourage you to report issues, improvements and feature requests regarding the project through GitHub Issue Tracker.
Important: And please be advised that, security issues must be reported to [email protected], not as GitHub issues, in order to reach proper audience. We strongly advise following the WSO2 Security Vulnerability Reporting Guidelines when reporting the security issues.
Licenses this source under the Apache License, Version 2.0 (LICENSE), You may not use this file except in compliance with the License.