End-user apps in WSO2 Identity Server
| Branch | Build Status |
|---|---|
| master |
- Install NodeJS from https://nodejs.org/en/download/.
- Install Maven from https://maven.apache.org/download.cgi.
- Download or clone the project source code from https://github.com/wso2/identity-apps
- Run
mvn clean installfrom the command line in the project root directory (where the rootpom.xmlis located).
If you are building product-is, the built identity apps dependencies will install to your local .m2 repository during the build above.
- Then you just need to build WSO2 Identiy Server after. (Follow the guide there)
- Execute
wso2server.sh(For unix environment) orwso2server.bat(For windows environment) file from thebindirectory to run the WSO2 Identity Server. - Navigate to
https://localhost:9443/user-portalorhttps://localhost:9443/admin-portalfrom the browser. (Add certificate exception if required)
- Do only if you skip WSO2 Identity Server build step above: Download the built distribution of WSO2 Identity Server from https://wso2.com/identity-and-access-management/.
- Add below code to
repository/resources/conf/templates/repository/conf/tomcat/web.xml.j2inWSO2 Identity Serverdistribution pack to allow CORS.
<filter>
<filter-name>CORS</filter-name>
<filter-class>com.thetransactioncompany.cors.CORSFilter</filter-class>
<init-param>
<param-name>cors.allowOrigin</param-name>
<param-value>https://localhost:9000, https://localhost:9001</param-value>
</init-param>
<init-param>
<param-name>cors.supportedMethods</param-name>
<param-value>GET, HEAD, POST, DELETE, OPTIONS, PATCH, PUT</param-value>
</init-param>
</filter>
<filter-mapping>
<filter-name>CORS</filter-name>
<url-pattern>/*</url-pattern>
<dispatcher>REQUEST</dispatcher>
<dispatcher>FORWARD</dispatcher>
</filter-mapping>- Add your hostname and port as a trusted FIDO2 origin in
repository/resources/conf/templates/repository/conf/identity/identity.xml.j2as given below.
<FIDO>
<WebAuthn>
<Enable>{{fido.webauthn.enable}}</Enable>
</WebAuthn>
<FIDO2TrustedOrigins>
{% for origin in fido.trusted.origins %}
<Origin>{{origin}}</Origin>
{% endfor %}
<Origin>https://localhost:9000</Origin>
</FIDO2TrustedOrigins>
</FIDO>- Execute
wso2server.sh(For unix environment) orwso2server.bat(For windows environment) file from thebindirectory to run WSO2 Identity Server. - Navigate to
https://localhost:9443/carbon/from the browser, and login to the system by entering an admin password.
Hint! Can find out the default password details here: https://docs.wso2.com/display/ADMIN44x/Configuring+the+System+Administrator
- In the system navigate to
Service Providers -> Listfrom left navigation. And then go toEditoption inUSER_PORTALapplication. Then after toInbound Authentication Configuration -> OAuth/OpenID Connect Configuration -> Edit. And then update theCallback Urlfeild with below value.
regexp=(https://localhost:9443/user-portal/login|https://localhost:9443/user-portal/logout|https://localhost:9000/user-portal/login|https://localhost:9000/user-portal/logout)
- Open cloned or downloaded Identity Apps repo and Run
npm run buildfrom the command line in the project root directory (where thepackage.jsonis located) to build all the packages with dependancies. (Note:- Not necessary if you have already done above identity apps build steps) - Start the apps in development mode, Execute
cd apps/<app> && npm startcommand. E.g.cd apps/user-portal && npm start.
We encourage you to report issues, improvements and feature requests regarding the project through GitHub Issue Tracker.
Important: And please be advised that, security issues must be reported to security@wso2.com, not as GitHub issues, in order to reach proper audience. We strongly advise following the WSO2 Security Vulnerability Reporting Guidelines when reporting the security issues.
Licenses this source under the Apache License, Version 2.0 (LICENSE), You may not use this file except in compliance with the License.