ForgeRock

MIRACL Trust Application Setup

An application on the MIRACL platform is required. It will be used by the Trusted IdP created in the OneLogin platform. Learn how to register a new app here.

Node for Authentication Trees

Integration manual

The steps of reference integration constructing are listed below.

  • Deploy Access Manager 6 as described in the ForgeRock manual.
  • Go to AM realm dashboard. Open “Authentication - Trees”.
  • Click “(+) Create Tree”.
  • Fill the form.
    • Tree Name: "MIRACL"
  • Click “Create”.

The GUI tree builder will appear. Initially it contains two connected nodes - "Start" and "Failure".

  • In the “Components” section at the left, find “OpenID Connect” one and drag it to the working area. Do the same for “Provision Dynamic Account” and “Success” components. You should have the following components at the working area:
    • “Start”
    • “OpenID Connect”
    • “Provision Dynamic Account”
    • “Success”
  • Click the “OpenID Connect” component. Properties list will appear at the right.
  • Fill the form.
    • Node Name: "MIRACL"
    • Client Id: The OIDC application client ID from Management Portal
    • Client Secret: The OIDC application client secret from Management Portal
    • Authentication Endpoint URL: "https://api.mpin.io/authorize"
    • Access Token Endpoint URL: "https://api.mpin.io/oidc/token"
    • User Profile Service URL: "https://api.mpin.io/oidc/userinfo"
    • OAuth Scope: "openid"
    • Redirect URL: The URL where AM is deployed
    • Social Provider: "MIRACL"
    • Auth ID Key: "id"
    • Use Basic Auth: Off
    • Account Provider: "org.forgerock.openam.authentication.modules.common.mapping.DefaultAccountProvider"
    • Account Mapper: "org.forgerock.openam.authentication.modules.common.mapping.JsonAttributeMapper"
    • Attribute Mapper: "org.forgerock.openam.authentication.modules.common.mapping.JsonAttributeMapper"
    • Add the following entry to Account Mapper Configuration. You have to click “Add” button first for subform to popup and click “+” button after finished:
      • "sub": "uid"
    • Add the following entries to Attribute Mapper Configuration. You have to click “Add” button first for subform to popup and click “+” button after finished:
      • "sub": "uid"
      • "email": "mail"
    • Save Attributes in the Session: Off
    • OpenID Connect Mix-Up Mitigation Enabled: Off
    • Token Issuer: https://api.mpin.io
    • OpenID Connect Validation Type: JWK URL
    • OpenID Connect Validation Value: https://api.mpin.io/oidc/certs
  • Now nodes should be connected in the given way. Node input is located at the left, and output(s) at the right. Connection is performed by dragging some output to a required input.

    • Connect “Start” node output to “MIRACL” node input.
    • Connect “MIRACL” node output saying “No account exists” to “Provision Dynamic Account” node input.
    • Connect “Provision Dynamic Account” node output to “Success” node input.

    ScreenShot

  • Click “Save”.

Test the integration

  • Go to AM realm dashboard. Open “Authentication - Settings”.
  • Go to “Core” tab.
    • Select Organization Authentication Configuration: "MIRACL"
  • Click “Save Changes”.
  • Once you change that, the default log in to AM will be "MIRACL" tree. If you want to go back to the administrator window to make changes to the configuration go to AM URL by appending "/console" (for example, "http://openam.partner.com:8080/openam/console"). This will use the administrator service to log in to AM (which should be the "ldapService").
  • Logout from Access Manager and try to login again.
  • AM should automatically redirect you to the MIRACL identity provider.

Authentication Module

Integration manual

The steps of reference integration constructing are listed below.

  • Deploy Access Manager 5.5 as described in the ForgeRock manual.
  • Go to AM realm dashboard. Open “Authentication - Modules”.
  • Click “(+) Add Module”.
  • Fill the form.
    • Name: "MIRACL"
    • Type: "Social Auth OpenID"
  • Click “Create”.
  • Fill the form.
    • Social Provider: "MIRACL"
    • Client Id: The OIDC application client ID from Management Portal
    • Client Secret: The OIDC application client secret from Management Portal
    • Authentication Endpoint URL: "https://api.mpin.io/authorize"
    • Access Token Endpoint URL: "https://api.mpin.io/oidc/token"
    • User Profile Service URL: "https://api.mpin.io/oidc/userinfo"
    • Use Basic Auth: Off
    • Subject Property: "uid"
    • Proxy URL: Leave the default value which should be something like this "http://xxx.xxx/openam/oauth2c/OAuthProxy.jsp" where xxx.xxx is your domain
    • Token Issuer: "https://api.mpin.io"
  • Click “Save Changes”.
  • Go to “OpenID Connect” tab.
    • OpenID Connect validation configuration type: jwk_url
    • OpenID Connect validation configuration value: "https://api.mpin.io/oidc/certs"
  • Click “Save Changes”.
  • Go to “Account Provisioning” tab.
  • Fill the form.
    • Account Provider: "org.forgerock.openam.authentication.modules.common.mapping.DefaultAccountProvider"
    • Account Mapper: "org.forgerock.openam.authentication.modules.common.mapping.JsonAttributeMapper|*|MIRACL-"
    • Account Mapper Configuration: "id=iplanet-am-user-alias-list"
    • Attribute Mapper: "org.forgerock.openam.authentication.modules.common.mapping.JsonAttributeMapper|iplanet-am-user-alias-list|MIRACL-"
    • Attribute Mapper Configuration: "personal.last_name=sn id=uid email.email=mail personal.nickname=cn personal.first_name=givenName"
  • Click “Save Changes”.
  • Go to “Authentication - Chains”.
  • Click “(+) Add Chain”.
  • Fill the form.
    • Name: "MIRACLAuthenticationService"
  • Click “Create”.
  • Click “(+) Add a Module”.
  • Fill the form.
    • Select Module: "MIRACL"
    • Select Criteria: "Required"
  • Click “Ok”.
  • Click “Save Changes”.
  • Go to “Authentication - Settings”.
  • Go to “User Profile” tab.
    • Select User Profile: "Ignored"
  • Click “Save Changes”.
  • Go to “Services”.
  • Click “Social Authentication Implementations”.
  • If there is no such entry, click (+) Add a service, and choose a service type “Social Authentication Implementations”.
  • Fill the form “Display Names”.
    • Key: "MIRACL"
    • Value: "MIRACL"
  • Click “(+) add”.
  • Fill the form “Authentication Chains”.
    • Key: "MIRACL"
    • Value: "MIRACLAuthenticationService"
  • Click “(+) add”.
  • Fill the form “Enabled Implementations”.
    • Add "MIRACL"
  • Click “Save Changes”.

Test the integration

  • Go to AM realm dashboard. Open “Authentication - Settings”.
  • Go to “Core” tab.
    • Select Organization Authentication Configuration: "MIRACLAuthenticationService"
  • Click “Save Changes”.
  • Once you change that, the default log in to AM will be "MIRACLAuthenticationService" tree. If you want to go back to the administrator window to make changes to the configuration go to AM URL by appending "/console" (for example, "http://openam.partner.com:8080/openam/console"). This will use the administrator service to log in to AM (which should be the "ldapService").
  • Logout from Access Manager and try to login again.
  • AM should automatically redirect you to the MIRACL identity provider.