Identity Patterns with the WSO2 Identity Server
Authenticate the users against one user store but fetch user attributes from multiple other sources
Problem:
Authenticate the users against one user store but fetch user attributes from multiple other sources
Problem:
- User credentials are maintained in a one user store while user attributes are maintained in multiple sources.
- When the user logs into the system via any SSO protocol (SAML 2.0, ODIC, WS-Federation), build the response with user attributes coming from multiple sources.
- Mount the credential store and all the attribute stores as user stores to the WSO2 Identity Server. Follow a naming convention while naming the user stores where the attributes store can be differentiated from the credentials stores just by looking at the user store domain name.
- Build a custom user store manager (extending the current user store manager corresponding to the type of the primary user store), which is aware of all the attribute stores in the system and override the method, which returns user attributes. The overridden method will iterate through the attribute stores find the user’s attributes and will return back the aggregated result.
- Set the custom user store manager from the previous step as the user store manager corresponding to the primary user store.
- Products: WSO2 Identity Server 4.6.0+