From 604d6a6914889b95987e4123c81f40f2b885a949 Mon Sep 17 00:00:00 2001 From: shanggeeth Date: Wed, 19 Jun 2024 14:30:12 +0530 Subject: [PATCH] Add instructions for mapping username and userid for LDAP based user stores --- .../docs/deploy/configure-a-read-only-ldap-user-store.md | 4 ++++ .../configure-a-read-write-active-directory-user-store.md | 1 + .../docs/deploy/configure-a-read-write-ldap-user-store.md | 5 +++++ .../docs/deploy/configure-a-read-only-ldap-user-store.md | 4 ++++ .../configure-a-read-write-active-directory-user-store.md | 1 + .../docs/deploy/configure-a-read-write-ldap-user-store.md | 4 ++++ .../configure-a-read-only-ldap-user-store.md | 4 ++++ .../configure-a-read-write-active-directory-user-store.md | 4 ++++ .../configure-a-read-write-ldap-user-store.md | 4 ++++ .../configure-a-read-only-ldap-user-store.md | 4 ++++ .../configure-a-read-write-active-directory-user-store.md | 4 ++++ .../configure-a-read-write-ldap-user-store.md | 4 ++++ 12 files changed, 43 insertions(+) diff --git a/en/identity-server/6.0.0/docs/deploy/configure-a-read-only-ldap-user-store.md b/en/identity-server/6.0.0/docs/deploy/configure-a-read-only-ldap-user-store.md index 48e568145f..c1eb052ff1 100644 --- a/en/identity-server/6.0.0/docs/deploy/configure-a-read-only-ldap-user-store.md +++ b/en/identity-server/6.0.0/docs/deploy/configure-a-read-only-ldap-user-store.md @@ -94,6 +94,10 @@ connection_password = "admin" ``` Apart from the properties mentioned above, WSO2 Identity Server also supports advanced LDAP configurations. +!!! note + It is important to map the `Username` and `User ID` claims correctly to the values used for `Username Attribute` and `User ID Attribute` properties in the userstore configuration for user authentication to work properly.
+ Claim mappings can be done through the management console as explained in [edit claim mapping]({{base_path}}/guides/dialects/edit-claim-mapping). + --- ## Properties used in read-only LDAP userstore manager diff --git a/en/identity-server/6.0.0/docs/deploy/configure-a-read-write-active-directory-user-store.md b/en/identity-server/6.0.0/docs/deploy/configure-a-read-write-active-directory-user-store.md index bea7c87aa7..eb2f40f1a2 100644 --- a/en/identity-server/6.0.0/docs/deploy/configure-a-read-write-active-directory-user-store.md +++ b/en/identity-server/6.0.0/docs/deploy/configure-a-read-write-active-directory-user-store.md @@ -113,6 +113,7 @@ since SCIM is enabled by default from the WSO2 Identity Server 5.10.0 onwards. !!! note It is required to edit the claim mappings in WSO2 IS according to the user claims of the Active Directory version you have configured.
+ Additioanlly the `Username` and `User ID` claims need to be mapped correctly to the values used for `Username Attribute` and `User ID Attribute` properties in the userstore configuration for authentication to work properly.

Before starting the server, edit the `/repository/conf/claim-config.xml` configuration file and change the `AttributeID` of the `Created Time` and `Last Modified Time` claims to `whenCreated` and `whenChanged` respectively. Start the server and edit the rest of the required claim mappings through the management console as explained in [edit claim mapping]({{base_path}}/guides/dialects/edit-claim-mapping). diff --git a/en/identity-server/6.0.0/docs/deploy/configure-a-read-write-ldap-user-store.md b/en/identity-server/6.0.0/docs/deploy/configure-a-read-write-ldap-user-store.md index 8bbb52bf97..1069329d33 100644 --- a/en/identity-server/6.0.0/docs/deploy/configure-a-read-write-ldap-user-store.md +++ b/en/identity-server/6.0.0/docs/deploy/configure-a-read-write-ldap-user-store.md @@ -92,6 +92,11 @@ connection_password = "admin" ``` Apart from above properties, WSO2 Identity Server also supports advanced LDAP configurations. +!!! note + It is important to map the `Username` and `User ID` claims correctly to the values used for `Username Attribute` and `User ID Attribute` properties in the userstore configuration for user authentication to work properly.
+ Claim mappings can be done through the management console as explained in [edit claim mapping]({{base_path}}/guides/dialects/edit-claim-mapping). + + --- ## Properties used in Read-write LDAP userstore manager diff --git a/en/identity-server/6.1.0/docs/deploy/configure-a-read-only-ldap-user-store.md b/en/identity-server/6.1.0/docs/deploy/configure-a-read-only-ldap-user-store.md index 48e568145f..c1eb052ff1 100644 --- a/en/identity-server/6.1.0/docs/deploy/configure-a-read-only-ldap-user-store.md +++ b/en/identity-server/6.1.0/docs/deploy/configure-a-read-only-ldap-user-store.md @@ -94,6 +94,10 @@ connection_password = "admin" ``` Apart from the properties mentioned above, WSO2 Identity Server also supports advanced LDAP configurations. +!!! note + It is important to map the `Username` and `User ID` claims correctly to the values used for `Username Attribute` and `User ID Attribute` properties in the userstore configuration for user authentication to work properly.
+ Claim mappings can be done through the management console as explained in [edit claim mapping]({{base_path}}/guides/dialects/edit-claim-mapping). + --- ## Properties used in read-only LDAP userstore manager diff --git a/en/identity-server/6.1.0/docs/deploy/configure-a-read-write-active-directory-user-store.md b/en/identity-server/6.1.0/docs/deploy/configure-a-read-write-active-directory-user-store.md index bea7c87aa7..eb2f40f1a2 100644 --- a/en/identity-server/6.1.0/docs/deploy/configure-a-read-write-active-directory-user-store.md +++ b/en/identity-server/6.1.0/docs/deploy/configure-a-read-write-active-directory-user-store.md @@ -113,6 +113,7 @@ since SCIM is enabled by default from the WSO2 Identity Server 5.10.0 onwards. !!! note It is required to edit the claim mappings in WSO2 IS according to the user claims of the Active Directory version you have configured.
+ Additioanlly the `Username` and `User ID` claims need to be mapped correctly to the values used for `Username Attribute` and `User ID Attribute` properties in the userstore configuration for authentication to work properly.

Before starting the server, edit the `/repository/conf/claim-config.xml` configuration file and change the `AttributeID` of the `Created Time` and `Last Modified Time` claims to `whenCreated` and `whenChanged` respectively. Start the server and edit the rest of the required claim mappings through the management console as explained in [edit claim mapping]({{base_path}}/guides/dialects/edit-claim-mapping). diff --git a/en/identity-server/6.1.0/docs/deploy/configure-a-read-write-ldap-user-store.md b/en/identity-server/6.1.0/docs/deploy/configure-a-read-write-ldap-user-store.md index 8bbb52bf97..3fcb31a0a9 100644 --- a/en/identity-server/6.1.0/docs/deploy/configure-a-read-write-ldap-user-store.md +++ b/en/identity-server/6.1.0/docs/deploy/configure-a-read-write-ldap-user-store.md @@ -92,6 +92,10 @@ connection_password = "admin" ``` Apart from above properties, WSO2 Identity Server also supports advanced LDAP configurations. +!!! note + It is important to map the `Username` and `User ID` claims correctly to the values used for `Username Attribute` and `User ID Attribute` properties in the userstore configuration for user authentication to work properly.
+ Claim mappings can be done through the management console as explained in [edit claim mapping]({{base_path}}/guides/dialects/edit-claim-mapping). + --- ## Properties used in Read-write LDAP userstore manager diff --git a/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-only-ldap-user-store.md b/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-only-ldap-user-store.md index 2353e6e1cc..e6e7fc042f 100644 --- a/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-only-ldap-user-store.md +++ b/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-only-ldap-user-store.md @@ -39,6 +39,8 @@ If you are configuring a server that has not been started yet, you need to updat For `created` and `modified` claims, it is recommended to use the `createTimestamp` and `modifyTimestamp` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + ### Updating configuration for existing servers !!! warning @@ -61,6 +63,8 @@ configurations. to learn more on updating attribute mappings. For `created` and `modified` attributes, it is recommended to use the `createTimestamp` and `modifyTimestamp` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + !!! Warning If you have more than one tenant, you need to change the attributes mappings for each tenant before adding the new configurations to the `deployment.toml` file. diff --git a/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-active-directory-user-store.md b/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-active-directory-user-store.md index e2ceb4d601..72854ec8fb 100644 --- a/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-active-directory-user-store.md +++ b/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-active-directory-user-store.md @@ -58,6 +58,8 @@ If you are configuring a server that has not been started yet, you need to updat For `created` and `modified` claims, it is recommended to use the `whenCreated` and `whenChanged` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + ### Updating configuration for existing servers !!! warning @@ -80,6 +82,8 @@ configurations. to learn more on updating attribute mappings. For `created` and `modified` claims, it is recommended to use the `whenCreated` and `whenChanged` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + !!! Warning If you have more than one tenant, you need to change the claim mappings for each tenant before adding the new configurations to the `deployment.toml` file. diff --git a/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-ldap-user-store.md b/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-ldap-user-store.md index f880119e4d..8a953b07ef 100644 --- a/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-ldap-user-store.md +++ b/en/identity-server/7.0.0/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-ldap-user-store.md @@ -41,6 +41,8 @@ If you are configuring a server that has not been started yet, you need to updat For `created` and `modified` claims, it is recommended to use the `createTimestamp` and `modifyTimestamp` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + ### Updating configuration for existing servers !!! warning @@ -63,6 +65,8 @@ configurations. to learn more on updating attribute mappings. For `created` and `modified` claims, it is recommended to use the `createTimestamp` and `modifyTimestamp` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + !!! Warning If you have more than one tenant, you need to change the claim mappings for each tenant before adding the new configurations to the `deployment.toml` file. diff --git a/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-only-ldap-user-store.md b/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-only-ldap-user-store.md index 2353e6e1cc..e6e7fc042f 100644 --- a/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-only-ldap-user-store.md +++ b/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-only-ldap-user-store.md @@ -39,6 +39,8 @@ If you are configuring a server that has not been started yet, you need to updat For `created` and `modified` claims, it is recommended to use the `createTimestamp` and `modifyTimestamp` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + ### Updating configuration for existing servers !!! warning @@ -61,6 +63,8 @@ configurations. to learn more on updating attribute mappings. For `created` and `modified` attributes, it is recommended to use the `createTimestamp` and `modifyTimestamp` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + !!! Warning If you have more than one tenant, you need to change the attributes mappings for each tenant before adding the new configurations to the `deployment.toml` file. diff --git a/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-active-directory-user-store.md b/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-active-directory-user-store.md index e2ceb4d601..72854ec8fb 100644 --- a/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-active-directory-user-store.md +++ b/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-active-directory-user-store.md @@ -58,6 +58,8 @@ If you are configuring a server that has not been started yet, you need to updat For `created` and `modified` claims, it is recommended to use the `whenCreated` and `whenChanged` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + ### Updating configuration for existing servers !!! warning @@ -80,6 +82,8 @@ configurations. to learn more on updating attribute mappings. For `created` and `modified` claims, it is recommended to use the `whenCreated` and `whenChanged` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + !!! Warning If you have more than one tenant, you need to change the claim mappings for each tenant before adding the new configurations to the `deployment.toml` file. diff --git a/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-ldap-user-store.md b/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-ldap-user-store.md index f880119e4d..8a953b07ef 100644 --- a/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-ldap-user-store.md +++ b/en/identity-server/next/docs/guides/users/user-stores/primary-user-store/configure-a-read-write-ldap-user-store.md @@ -41,6 +41,8 @@ If you are configuring a server that has not been started yet, you need to updat For `created` and `modified` claims, it is recommended to use the `createTimestamp` and `modifyTimestamp` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + ### Updating configuration for existing servers !!! warning @@ -63,6 +65,8 @@ configurations. to learn more on updating attribute mappings. For `created` and `modified` claims, it is recommended to use the `createTimestamp` and `modifyTimestamp` operational attributes. + For `username` and `userid` claims, the `Username Attribute` and `User ID Attribute` properties configured in the User Store configuration should be used to ensure proper user authentication. + !!! Warning If you have more than one tenant, you need to change the claim mappings for each tenant before adding the new configurations to the `deployment.toml` file.