SlideShare a Scribd company logo
1 of 4
Here are many unique business requirements and workflows that determine how new
people are registered at an organization. This blog will focus on a single, relatively simple
use case: an organization that uses password credentials, where there is a CMS that
manages content, an ecommerce platform that completes the sale, and active directory
single sign on. Let’s just say for the sake of argument that the CMS is Life Ray, and the
ecommerce platform is Magneto. So how could a person initially register in Life ray, and
then seamless access Magneto? Consider this diagram below:
One thing to note is that there is a database record for the person in each system–
LifeRay, Magneto, and the Gluu Server. But only one system holds the password–the
Gluu Server. The apps continue to use their local database as normal–the password is
not needed (except for authentication–which is now centralized).
So how do these user records get created? As with everything related to identity and
security, the answer is “it depends”. But here is one example where the CMS is used for
registration. The choice to use the CMS to register a person is common for many
consumers facing web applications–it enables the developers to present the exact look
and feel that they desire, and to use the development tools with which they are familiar.
Here are the steps:
Person fills out registration form on CMS
CMS validates the information (sends email, calls fraud detection APIs, etc)
CMS uses SCIM API of Gluu Server to add person (including the password) to the Gluu
Server LDAP database.
Now that the Gluu server has the user in the LDAP server, the CMS could either make
the person Login using OpenID Connect (Gluu Server) or a fancy alternative is to use
the password from the registration form to initiate the OpenID Connect session
behind the scenes.
Person browses CMS for a while… then person follows a link to Magneto
Magneto can detect that the person has already authenticated at the Gluu Server, but
Oh no! There is no database record for the person in Magneto! Dynamic enrollment
is needed. Magneto can present a form to the person to enter any information that is
not sent via the OpenID Connect id_token or it can simply use the information in the
id_token to create the local Magneto database record for the person
Voila!
The other consideration is logout. When a person ends his session in Life ray, how do
other applications find out that the session has ended at the OpenID Connect
Provider (the Gluu Server)? In the current Session Management specification,
JavaScript in the Magneto tab would detect that the session has ended, and would
notify the Magneto server (otherwise the Magneto session may exist on the server
until the person’s session is automatically timed out).
This approach allows the CMS to maintain control of Registration, and future proofs
the applications by ensuring that they no longer have to store local user credentials
or implement any other business logic for two factor security.
Article resource:-http://thegluuserver.tumblr.com/post/91117059024/simple-user-
registration-and-dynamic-enrollment-cms

More Related Content

More from Gluu

First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
Gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
Gluu
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
Gluu
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
Gluu
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
Gluu
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Gluu
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
Gluu
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
Gluu
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
Gluu
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
Gluu
 

More from Gluu (16)

17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
 

Simple user registration and dynamic enrollment cms ecommerce

  • 1. Here are many unique business requirements and workflows that determine how new people are registered at an organization. This blog will focus on a single, relatively simple use case: an organization that uses password credentials, where there is a CMS that manages content, an ecommerce platform that completes the sale, and active directory single sign on. Let’s just say for the sake of argument that the CMS is Life Ray, and the ecommerce platform is Magneto. So how could a person initially register in Life ray, and then seamless access Magneto? Consider this diagram below:
  • 2. One thing to note is that there is a database record for the person in each system– LifeRay, Magneto, and the Gluu Server. But only one system holds the password–the Gluu Server. The apps continue to use their local database as normal–the password is not needed (except for authentication–which is now centralized). So how do these user records get created? As with everything related to identity and security, the answer is “it depends”. But here is one example where the CMS is used for registration. The choice to use the CMS to register a person is common for many consumers facing web applications–it enables the developers to present the exact look and feel that they desire, and to use the development tools with which they are familiar. Here are the steps: Person fills out registration form on CMS CMS validates the information (sends email, calls fraud detection APIs, etc) CMS uses SCIM API of Gluu Server to add person (including the password) to the Gluu Server LDAP database.
  • 3. Now that the Gluu server has the user in the LDAP server, the CMS could either make the person Login using OpenID Connect (Gluu Server) or a fancy alternative is to use the password from the registration form to initiate the OpenID Connect session behind the scenes. Person browses CMS for a while… then person follows a link to Magneto Magneto can detect that the person has already authenticated at the Gluu Server, but Oh no! There is no database record for the person in Magneto! Dynamic enrollment is needed. Magneto can present a form to the person to enter any information that is not sent via the OpenID Connect id_token or it can simply use the information in the id_token to create the local Magneto database record for the person
  • 4. Voila! The other consideration is logout. When a person ends his session in Life ray, how do other applications find out that the session has ended at the OpenID Connect Provider (the Gluu Server)? In the current Session Management specification, JavaScript in the Magneto tab would detect that the session has ended, and would notify the Magneto server (otherwise the Magneto session may exist on the server until the person’s session is automatically timed out). This approach allows the CMS to maintain control of Registration, and future proofs the applications by ensuring that they no longer have to store local user credentials or implement any other business logic for two factor security. Article resource:-http://thegluuserver.tumblr.com/post/91117059024/simple-user- registration-and-dynamic-enrollment-cms