An authentication node for integration with the XignIn Authentication System. Using XignIn you will be able to authenticate against OpenAM > v6.5 using your smartphone.
XignIn offers you the ability to login and get access to ICT Systems, e. g. ForgeRock, password-less via Smartphone, backed by a high security SaaS platform. Use XignIn as 1-, 2- and M-Factor Authentication tool. Easily integrated via QR Code or Push-Authentication to mitigate cyberattacks like Phishing.
Copy the .jar file from the ../target directory into the ../web-container/webapps/openam/WEB-INF/lib directory where AM is deployed. Restart the web container to pick up the new node. The node will then appear in the authentication trees components palette.
USAGE HERE
To use authentication via smartphone you have to download the XignIn App and register yourself at XignIn Public to be able to configure your client (aka ForgeRock OpenAM).
Fill in the provided form. Only your e-mail address and the activation PIN are required fields.
A QR Code is sent to you via email. The qr code is used to enroll your smartphone in the XignIn System. As soon as you have received the qr code follow these instructions:
-
Open up the app, type in the transport pin you have provided when registering yourself.
-
The App then prompts for some authentication factors
-
Press personalize to enroll your device
-
The personalization process takes about 30 seconds until you are enrolled
Configuration
Log in to XignIn Public to create an organization and register your client (i.e. your forgerock instance).
-
Create your organization. From the menu to your left choose Add Organization
-
Fill in the name of your Organization (Name is the only required field) and click the accept button in the lower right corner
-
After your organization is created, you will be taken to the overview. Click the EDIT link of your newly created organization.
-
You will see the overview of your empty organization.
- Now you will have to add service to your organization to establish the trust relationship between you openam instance and XignIn. To do so click the ADD link. A Window will open, where you have to provide the necessary information:
- Name - The name of your client
- Encryption Algorithm (EC or RSA, EC recommended) - the algorithm used to encrypt the XignIn authentication response
- Redirect URL - a vanity URL
- Login Domain - the domain name from which the authentication is triggered. E.g. if your OpenAM instance is deployed on https://example.com/openam, using https://example.com as the Login Domain is sufficient
- After successful registration of your client the newly created client will appear under in the services menu
- Last but not least, you have to activate your client and download the corresponding configuration file. To do so, click the pen icon next to your created client to pen the client configuration view. Choose the pen icon of your client card and toggle the active slider to activate your client. By clicking the download icon you can download the configuration files.
Example XignIn Configuration
This is the straight forward configuration for the use of XignIn for MFA: The zip-archive you downloaded contains a json file, whose contents have to be copied to the jsonConfig field of the node configuration.
To map the XignIn Identity to your corresponding OpenAM Identity you can configure following mappings:
- For From XignIn Mapping choose EMAIL
- For To Forgerock Mapping choose MAIL or USERNAME
- Optionally you can enable the creation of a identity in OpenAM if it does not exist by toggling Create User on First Login
Via the drop-down mapping menu, you will be able to configure, which data should match the identity attributes in your identity repository. The data is delivered by the XignIn system.
XignIn
Open up your personalized XignIn App and scan the displayed qr code with the integrated qr code scanner.
After scanning the qr code, the app gives a haptic feedback, and you'll see that the app communicates with the XignIn backend system. You'll be prompted to accept or decline the delivery of the displayed attributes to openam.
After you have accepted the delivery of the attributes, you'll be prompted to authenticate yourself against the XignIn App. If you have configured a fingerprint when you personalized your device, you'll be prompted for fingerprint authentication, if not you'll be prompted to enter your personal PIN.







