Configuring Identity Server
WSO2 Open Banking UK Toolkit contains TOML-based configurations. All the server-level configurations of the Identity
Server instance can be applied using a single configuration file, which is the deployment.toml
file.
Configuring deployment.toml¶
Follow the steps below to configure the deployment.toml
file and set up the open banking flow for WSO2 Identity Server.
-
Replace the
deployment.toml
file as explained in the Setting up the servers section. -
Open the
<IS_HOME>/repository/conf/deployment.toml
file. -
Set the hostname of the Identity Server:
[server] hostname = "<IS_HOST>"
-
Update the datasource configurations with your database properties, such as the username, password, JDBC URL for the database server, and the JDBC driver.
- Given below are sample configurations for a MySQL database. For other DBMS types and more information, see Setting up databases.
[database.shared_db] url = "jdbc:mysql://localhost:3306/openbank_govdb?autoReconnect=true&useSSL=false" username = "root" password = "root" driver = "com.mysql.jdbc.Driver"
[database.identity_db] url = "jdbc:mysql://localhost:3306/openbank_apimgtdb?autoReconnect=true&useSSL=false" username = "root" password = "root" driver = "com.mysql.jdbc.Driver"
[database.config] url = "jdbc:mysql://localhost:3306/openbank_iskm_configdb?autoReconnect=true&useSSL=false" username = "root" password = "root" driver = "com.mysql.jdbc.Driver"
[database.user] url = "jdbc:mysql://localhost:3306/openbank_userdb?autoReconnect=true&useSSL=false" username = "root" password = "root" driver = "com.mysql.jdbc.Driver"
[[datasource]] id="WSO2OB_DB" url = "jdbc:mysql://localhost:3306/openbank_openbankingdb?autoReconnect=true&useSSL=false" username = "root" password = "root" driver = "com.mysql.jdbc.Driver"
-
Configure the authentication endpoints with the hostname of the Identity Server.
[authentication.endpoints] login_url = "https://<IS_HOST>:9446/authenticationendpoint/login.do" retry_url = "https://<IS_HOST>:9446/authenticationendpoint/retry.do"
[oauth.endpoints] oauth2_consent_page = "${carbon.protocol}://<IS_HOST>:${carbon.management.port}/ob/authenticationendpoint/oauth2_authz.do" oidc_consent_page = "${carbon.protocol}://<IS_HOST>:${carbon.management.port}/ob/authenticationendpoint/oauth2_consent.do"
-
Configure the following endpoints for the
token_revocation
event listener:- Configure
TokenEndpointAlias
with the hostname of the Identity Server. - Configure
notification_endpoint
with the hostname of the API Manager.
[[event_listener]] id = "token_revocation" ... [event_listener.properties] TokenEndpointAlias= "https://<IS_HOST>:9446/oauth2/token" notification_endpoint = "https://<APIM_HOST>:9443/internal/data/v1/notify"
- Configure
-
Add and configure the following tags:
signing_certificate_kid
: Configure thekid
value for the signing certificate of the bank. The same value is configured as thekid
value of the ID Token.client_transport_cert_as_header_enabled
: To send the client certificate as a transport header, set this totrue
.
[open_banking.identity] signing_certificate_kid="123" client_transport_cert_as_header_enabled = true
-
Configure the event publisher URL for adaptive authentication with the hostname of the Identity Server.
[authentication.adaptive.event_publisher] url = "http://<IS_HOST>:8006/"
-
Update access control configurations for the
consentmgr
resource as follows:[[resource.access_control]] context = "(.*)/consentmgr(.*)" secure="false" http_method="GET,DELETE"
-
Configure the endpoints to retrieve sharable and payable accounts. This is required when displaying the accounts on the consent page.
[open_banking_uk.consent] payable_account_retrieval_endpoint = "http://<APIM_HOST>:9763/api/openbanking/uk/backend/services/bankaccounts/bankaccountservice/payable-accounts" sharable_account_retrieval_endpoint = "http://<APIM_HOST>:9763/api/openbanking/uk/backend/services/bankaccounts/bankaccountservice/sharable-accounts"
-
To generate the self link in the consent JSON response, configure the URLs of the exposed APIs as follows:
[open_banking_uk.consent] account_consent_self_link = "https://<APIM_HOST>:8243/open-banking/{version}/aisp/" payment_consent_self_link = "https://<APIM_HOST>:8243/open-banking/{version}/pisp/" cof_consent_self_link = "https://<APIM_HOST>:8243/open-banking/{version}/cbpii/"
-
In the consent re-authentication step of the Accounts flow, during authorisation, the PSU is allowed to change the selected account. To enable this feature and update the account bound to the consent, set the following property to true:
[open_banking_uk.consent] acc_update_by_psu_enabled = true
-
Enable Request-URI validation that validates
AccountID
in the request against theAccountID
in consent during account retrieval. By default, this is disabled and the configuration is set tofalse
.[open_banking_uk.consent] Validate_acc_id_on_retrieval_enabled = true
-
To enable idempotency support for the Payments Initiation API:
- Configure the allowed time duration for the Idempotency key in hours
- Replay and enable payment submission idempotency validation
[open_banking.consent.idempotency] enabled=true allowed_time_duration=1440
-
Add the given configuration to renew the access token and refresh token per each token request while revoking the existing active token for a matching combination of
clientid
,user
, andscopes
.Note
The token renewal is not applicable when using the Refresh Token grant type and self-contained access tokens.
[oauth.token_renewal] renew_access_token_per_request = true
-
Previously the Open Banking Standard required the re-authentication of refresh tokens issued for Account and Transaction API when the token issue date has passed 90 days. With Open Banking Standard v3.1.10, this mandate has been removed. Therefore, according to your requirement, add the following tags:
Note
This is only available as a WSO2 Update from WSO2 Open Banking API Manager UK Toolkit Level 1.0.0.5 and WSO2 Open Banking Identity Server UK Toolkit Level 1.0.0.5 onwards. For more information on updating, see Getting WSO2 Updates.
If you already have a setup, perform a data migration for the exiting active account refresh tokens in the
IDN_OAUTH2_ACCESS_TOKEN
table in theopenbank_apimgtdb
database.[open_banking.identity.extensions] response_type_handler = "com.wso2.openbanking.uk.identity.auth.extensions.response.handler.impl.UKResponseTypeHandler" [open_banking_uk.account.refresh_token] validity_period = 15555200 last_authorized_date_limit = 90
-
If you want to use the Data publishing feature:
- Enable the feature and configure the
server_url
andauth_url
properties with the hostname of WSO2 Streaming Integrator.
[open_banking.data_publishing] enable = true username="$ref{super_admin.username}@carbon.super" password="$ref{super_admin.password}" server_url = "{tcp://<SI_HOST>:7612}"
- Enable the feature and configure the
-
If you are using WSO2 Identity Server 6.0.0,
- Open the
<IS_HOME>/repository/conf/deployment.toml
file. -
Add below configuration to enable application role validation:
[application_mgt] enable_role_validation = true
- Open the
Starting servers¶
If you are using JDK 17 with WSO2 Identity Server 6.0.0, you need to enable adaptive authentication. Click here to see how it is done...
For JDK 17 runtime, adaptive authentication is disabled by default and it is required to enable adaptive authentication. To enable adaptive authentication:
- Go to
<IS_HOME>/bin
. -
Run the following command:
./adaptive.sh
./adaptive.bat
See Adaptive Authentication - Prerequisites for more information.
-
Go to the
<IS_HOME>/bin
directory using a terminal. -
Run the
wso2server.sh
script as follows:./wso2server.sh