Skip to content

Commit 9f3d051

Browse files
authored
fix: #2487 removing duplicated files (#3007)
1 parent 7b66f2b commit 9f3d051

File tree

143 files changed

+78
-17274
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

143 files changed

+78
-17274
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
# BioID Web Service
2+
## Overview
3+
[BioID Web Service](https://www.bioid.com) is a "Biometrics as a service" provider. This document will explain how to use Gluu's [BioID interception script](https://github.com/GluuFederation/oxAuth/blob/master/Server/integrations/bioID/BioIDExternalAuthenticator.py) to configure the Gluu Server for a two-step authentication process with username and password as the first step, and BioID's biometric authentication as the second step.
4+
5+
In order to use this authentication mechanism your organization will need to register for a BioID account.
6+
7+
## Prerequisitesm
8+
- A Gluu Server ([installation instructions](../installation-guide/index.md));
9+
- [BioID interception script](https://github.com/GluuFederation/oxAuth/blob/master/Server/integrations/bioID/BioIDExternalAuthenticator.py) (included in the default Gluu Server distribution);
10+
- An account with [BioID](https://bwsportal.bioid.com/register).
11+
12+
## Properties
13+
The mandatory properties in the BioID authentication script are as follows
14+
| Property | Description | Example |
15+
|-----------------------|-------------------------------|---------------|
16+
|ENDPOINT |URL of the BioID Web Service|`https://bws.bioid.com/extension/`|
17+
|APP_IDENTIFIER |API key |`c20b04cc-776a-45ed-7a1f-06347f8edf6c`|
18+
|APP_SECRET |API secret |`sTGB4n4HAkvc2BnJp6KeNUTk`|
19+
|STORAGE |The storage name assigned by BioID depending on the type of contract you have. |`bws`|
20+
|PARTITION |A number assigned to your company by BioID. |`12345`|
21+
22+
23+
24+
## Configure BioID Account
25+
26+
1. [Sign up](https://bwsportal.bioid.com/register) for a BioID account.
27+
28+
2. Upon registration, you will recieve an email with the instance name (listed as STORAGE in Gluu's BioID authentication script), partition number(listed as PARTITION in Gluu's BioID authentication script).
29+
30+
3. As the owner of this instance, you are entitled to access BWS Portal at https://bwsportal.bioid.com using the account associated with your email.
31+
With the BWS Portal, you can do the following:
32+
a. View your trial information such as your credentials (e.g. your client certificate), enrolled classes, BWS logs and more.
33+
b. Create your App ID and App secret, under "Web API keys".
34+
35+
## BioID Documentation
36+
37+
You can find all API reference at https://developer.bioid.com/bwsreference.
38+
Lots of useful information about BWS is available at https://developer.bioid.com/blog.
39+
If you intend to use liveness detection, you will find information about motion trigger helpful: https://developer.bioid.com/app-developer-guide/bioid-motion-detection
40+
41+
## Configure oxTrust
42+
43+
Follow the steps below to configure the BioID module in the oxTrust Admin GUI.
44+
45+
1. Navigate to `Configuration` > `Person Authentication Scripts`.
46+
1. Scroll down to the BioID authentication script
47+
![bioid-script](../img/admin-guide/multi-factor/bioid-script.png)
48+
49+
1. Configure the properties, all of which are mandatory, according to your API
50+
51+
1. Enable the script by ticking the check box
52+
![enable](../img/admin-guide/enable.png)
53+
54+
Now BioID's biometric authentication is available as an authentication mechanism for your Gluu Server. This means that, using OpenID Connect `acr_values`, applications can now request BioID biometric authentication for users.
55+
56+
!!! Note
57+
To make sure BioID has been enabled successfully, you can check your Gluu Server's OpenID Connect configuration by navigating to the following URL: `https://<hostname>/.well-known/openid-configuration`. Find `"acr_values_supported":` and you should see `"bioid"`.
58+
59+
## Make BioID the Default Authentication Mechanism
60+
61+
Now applications can request BioID's biometric authentication. To make BioID biometic authentication your default authentication mechanism, follow these instructions:
62+
63+
1. Navigate to `Configuration` > `Manage Authentication`.
64+
2. Select the `Default Authentication Method` tab.
65+
3. In the Default Authentication Method window you will see two options: `Default acr` and `oxTrust acr`.
66+
67+
- The `oxTrust acr` field controls the authentication mechanism that is presented to access the oxTrust dashboard GUI (the application you are in).
68+
- The `Default acr` field controls the default authentication mechanism that is presented to users from all applications that leverage your Gluu Server for authentication.
69+
70+
You can change one or both fields to BioID authentication as you see fit. If you want BioID to be the default authentication mechanism for access to oxTrust and all other applications that leverage your Gluu Server, change both fields to bioid.
71+
72+
![BioID](../img/admin-guide/multi-factor/bioID.png)

docs/script-catalog/person_authentication/other/forgot_password/README.md

-26
This file was deleted.

0 commit comments

Comments
 (0)