Skip to main content
Version: v11.9.2

Configure JWS and Opaque providers

WaveMaker offers many security providers to enable authentication to the WaveMaker applications from the security dialog. The security providers like DEMO, Database, LDAP, Active Directory, SAML, OpenID, and Custom Security are the primary security providers. Additionally along with the primary provider a secondary provider can also be enabled like JWS or Opaque Token provider.

Enabling JWS Provider

  1. Navigate to the File Explorer and search auth-info.json.

  1. Add the below JSON content to auth-info.json which is a sample JSON structure to enable JWS.


"secondaryAuthProviders": {
"JWS": {
"enabled": true,
"jwsProviderIdVsProviderInfo": {
"okta": {
"providerId": "okta",
"enabled": true,
"issuerUrl": " ",
"principalClaimName": "email",
"roleMappingEnabled": true,
"roleMappingConfig": {
"modelName": "testdb",
"entityName": "RoleTable",
"tableName": "ROLE_TABLE",
"usernameField": "username",
"usernameColumn": "USERNAME",
"roleField": "role",
"roleColumn": "ROLE",
"roleQuery": "",
"queryType": "HQL"
}
},
"google": {
"providerId": "google",
"enabled": true,
"issuerUrl": "https://accounts.google.com",
"principalClaimName": "email",
"roleMappingEnabled": true,
"roleMappingConfig": {
"roleAttributeName": "roleAttribute"
}
}
},
"type": "JWS"
}


}

  1. Go to ${openid-server-url}/.well-known/openid-configuration API that returns the issuer URL and other details of the server. This helps to find the issuer URL if the provider that is being configured follows OpenID spec.
  2. Under the JWS section set enabled as true.
note

JWS provider can have multiple providers configured like Google, Okta, and each sub-provider can be enabled/disabled.

FieldDescription
providerIdA unique provider ID for each sub provider in JWS
issuerUrlThe issuer URL of the open ID provider.
principalClaimNameThe claim name in the ID token which will be used as current logged in user’s userID
roleMappingEnabledrole mapping can be enabled/disabled for each sub provider
roleMappingConfigJWS supports two types of role mappings

Role Mapping in JWS

The role attribute is configured using the JWS or database. To know more about role mapping, see Role Mapping.

JWS Role Attribute Mapping

Configure a role attribute in the issuer. The attribute should be available in the ID token claims. This attribute value is used for role mapping authorization. Add roleAttributeName in the JSON structure as shown below.

Database Role Attribute Mapping

Configure a role table and once the token is authenticated the current logged-in user role is retrieved from the database. Add the modelName, entityName,tableName, usernameField, usernameColumn, roleField, roleColumn or roleQuery, queryType in the JSON structure as shown below for the Okta provider.

  1. Save the auth-info.json file and open the security dialog.

  1. Go to the Authentication and Authorization tab to enable the primary security provider. Click Save.
note

A primary security provider should be enabled to apply a secondary provider to the application.

  1. Navigate to the File Explorer and open the required profile properties file.

  1. Update the property security.activeProviders by adding JWS to it. Example: DEMO, JWS.

  1. Invoke an API by passing the ID token as a bearer token. To know how to pass the ID token as a bearer token in the WaveMaker application, see How to Pass Logged-In User ID/Access Tokens as Header.
note

If the incoming token is of JWS format then enable the JWS provider.

Enabling Opaque Token Provider

  1. Navigate to the File Explorer and search auth-info.json.

  1. Add the below JSON content to auth-info.json to enable the Opaque token provider.

 "secondaryAuthProviders": {
"OPAQUE_TOKEN": {
"enabled": false,
"introspectionUrl": " ",
"clientId": " ",
"clientSecret": " ",
"principalClaimName": "sub",
"roleMappingEnabled": true,
"roleMappingConfig": {
"modelName": "testdb",
"entityName": "RoleTable",
"tableName": "ROLE_TABLE",
"usernameField": "username",
"usernameColumn": "USERNAME",
"roleField": "role",
"roleColumn": "ROLE",
"roleQuery": "",
"queryType": "HQL"
},
"type": "OPAQUE_TOKEN"
}
}

  1. Go to ${openid-server-url}/.well-known/openid-configuration API that returns the introspection URL and other details of the server. This helps to find the introspection URL if the provider that is being configured follows OpenID spec.
  2. Under the OPAQUE_TOKEN section set enabled as true.
note

Opaque token provider can be enabled only if the OpenID provider that is used supports introspection.

FieldDescription
introspectionUrlIntrospection endpoint is used to validate the access token and should be supported by the provider.
clientId and clientSecretProvided by the open ID provider once the app is registered.
principalClaimNameThe claim name in the Access token which will be used as current logged-in user’s ID.
roleMappingEnabledrole mapping can be enabled/disabled for each sub provider.
roleMappingConfigOpaque token provider supports two types of role mappings.

Role Mapping in Opaque Token

The role attribute is configured using the Opaque token or database. To know more about role mapping, see Role Mapping.

Opaque Token Role Attribute Mapping

Configure a role attribute in the issuer. The attribute should be available in the ID token claims and the attribute value will be used for authorization(role mapping). Add roleAttributeName in the JSON structure under the roleMappingConfig as shown below.

Database Role Attribute Mapping

Configure a role table and once the token is validated using the introspection endpoint the current logged-in user role is retrieved from the database. Add modelName, entityName, tableName, usernameField, usernameColumn, roleField, roleColumn or roleQuery, queryType in the JSON structure as shown below.

  1. Save the auth-info.json file and open the security dialog.

  1. Go to the Authentication and Authorization tab to enable the primary security provider. Click Save.
note

A primary security provider should be enabled to apply a secondary provider to the application.

  1. Navigate to the File Explorer and open the required profile properties file.

  1. Update the property security.activeProviders by adding OPAQUE_TOKEN to it. Example: DEMO, OPAQUE_TOKEN.

  1. Invoke an API by passing the access token as a bearer token. To know how to pass access token as bearer token in the WaveMaker application, see How to Pass Logged-In User ID/Access Tokens as Header.
note

If the incoming token is of Opaque format then enable the Opaque token provider.