Skip to content

Commit 112b73f

Browse files
committed
Merge branch '4.6.0' of github.com:wso2/docs-apim into 4.6.0
2 parents a9a98ea + 8c38f1c commit 112b73f

File tree

2 files changed

+28
-8
lines changed

2 files changed

+28
-8
lines changed

en/docs/administer/managing-users-and-roles/managing-user-stores/writing-a-custom-user-store-manager.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -517,6 +517,22 @@ in your WSO2 product.
517517
different primary user store configured. For more information
518518
configuring user stores in WSO2 products, see [Configuring User
519519
Stores]({{base_path}}/administer/product-administration/managing-users-and-roles/managing-user-stores/configuring-secondary-user-stores/).
520+
521+
**Adding custom user store as a secondary user store**
522+
523+
If you need to add the custom user store as a **secondary** user store, you must use one of the following configurations in the `<API-M_HOME>/repository/conf/deployment.toml` file instead of the configuration shown above:
524+
525+
**Option 1:** Add to the allowed user stores list
526+
``` toml
527+
[user_store_mgt]
528+
allowed_user_stores=["org.wso2.carbon.user.core.jdbc.UniqueIDJDBCUserStoreManager", "org.wso2.carbon.user.core.ldap.UniqueIDActiveDirectoryUserStoreManager","org.wso2.carbon.user.core.ldap.UniqueIDReadOnlyLDAPUserStoreManager","org.wso2.carbon.user.core.ldap.UniqueIDReadWriteLDAPUserStoreManager","org.wso2.custom.user.store.CustomUserStoreManager"]
529+
```
530+
531+
**Option 2:** Add to the custom user stores list
532+
``` toml
533+
[user_store_mgt]
534+
custom_user_stores=["org.wso2.custom.user.store.CustomUserStoreManager"]
535+
```
520536

521537

522538
You do not need to change anything else since you extend the
@@ -528,6 +544,10 @@ Once you have done this, start the product and see the log messages that
528544
you have placed inside overridden methods when you create a new user or
529545
login. This ensures that all your configurations work as intended.
530546

547+
## Sample implementations
548+
549+
For additional reference and sample implementations, see the [sample custom user store manager](https://github.com/wso2/product-is/tree/v5.10.0/modules/samples/user-mgt/sample-custom-user-store-manager) available in the WSO2 Identity Server repository. This sample demonstrates how to extend default user store managers by implementing a new user store, with comprehensive examples and project structure.
550+
531551
!!! note "Do you want to create a custom user store that only has few enabled methods? Follow the steps given below:"
532552
1. Sign in to the WSO2 API management console.
533553
2. Click **Add** under User Stores.

en/docs/api-security/key-management/third-party-key-managers/configure-keycloak-connector.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -116,8 +116,8 @@ Follow the instructions given below to configure Keycloak as a third-party Key M
116116
<tr class="even">
117117
<td>Issuer</td>
118118
<td>The issuer that consumes or validates the access tokens
119-
</br> e.g., https://localhost:8443/auth/realms/master</br>
120-
http://localhost:8080/auth/realm</td>
119+
</br> e.g., https://localhost:8443/realms/master</br>
120+
http://localhost:8080/realm</td>
121121
<td>Mandatory</td>
122122
</tr>
123123
<tr class="odd">
@@ -128,16 +128,16 @@ Follow the instructions given below to configure Keycloak as a third-party Key M
128128
<tr class="even">
129129
<td>Client Registration Endpoint </td>
130130
<td>The endpoint to verify the identity and obtain profile information of the end-user based on the authentication performed by an authorization server.</br>
131-
e.g., https://localhost:8443/auth/realms/master/clients-registrations/openid-connect
131+
e.g., https://localhost:8443/realms/master/clients-registrations/openid-connect
132132
</td>
133133
<td>Mandatory</td>
134134
</tr>
135135
<tr class="odd">
136136
<td>Introspection Endpoint</td>
137137
<td>The endpoint that allows authorized protected resources to query the authorization server to determine the set of metadata for a given token that was presented to them by an OAuth client.
138138
</br> e.g.,
139-
http://localhost:8080/auth/realms/master/protocol/openid-connect/token/introspect </br>
140-
https://localhost:8443/auth/realms/master/protocol/openid-connect/token/introspect
139+
http://localhost:8080/realms/master/protocol/openid-connect/token/introspect </br>
140+
https://localhost:8443/realms/master/protocol/openid-connect/token/introspect
141141
</td>
142142
<td>Mandatory</td>
143143
</tr>
@@ -146,8 +146,8 @@ Follow the instructions given below to configure Keycloak as a third-party Key M
146146
<td>The endpoint that issues the access tokens.
147147
</br>
148148
e.g.,
149-
http://localhost:8080/auth/realms/master/protocol/openid-connect/token</br>
150-
https://localhost:8443/auth/realms/master/protocol/openid-connect/token
149+
http://localhost:8080/realms/master/protocol/openid-connect/token</br>
150+
https://localhost:8443/realms/master/protocol/openid-connect/token
151151
</td>
152152
<td>Mandatory</td>
153153
</tr>
@@ -274,7 +274,7 @@ Follow the instructions given below to configure Keycloak as a third-party Key M
274274
If this option is used to validate the tokens it is mandatory to add a Token Handling Option.
275275
For the Okta it should be <b>JWT</b> and it is required to specify a claim mapping as a unique identifier.
276276
</br>e.g.,; Claim Key : iss
277-
</br>Claim Value : https://localhost:8443/auth/realms/master </td>
277+
</br>Claim Value : https://localhost:8443/realms/master </td>
278278
<td>Optional</td>
279279
</tr>
280280
<tr class="odd">

0 commit comments

Comments
 (0)