Skip to content

Configure Enterprise Login

With API Platform, you can configure enterprise login to allow users from an external identity provider (IdP) to sign in to API Platform seamlessly without changing their credentials.

This guide walks you through the steps to configure enterprise login for your organization in API Platform.

Prerequisites

Before you proceed with the configuration, set up the following:

  • A valid email domain for your organization.
  • Access the API Platform Console via your Google, GitHub, or Microsoft account. If you are a new user, create an organization with a unique organization name. For example, "Stark Industries".

Configure enterprise login for your API Platform organization

To configure enterprise login for your API Platform organization, follow the steps given below:

  • If you already have a support account with us, send us your organization name/handle and the email domains specific to your organization through our support portal.

  • If you do not have a support account with us yet, send an email to bijira-help@wso2.com requesting to enable enterprise login for your organization.

Tip

Ensure you include the following information in the request: - Organization name or handle. For example, “Stark Industries” or “starkindustries”. - Email domains specific to your organization. For example, “@stark.com”, “@starkindustries.com”, and “@stark.eu.

Sample email

Subject : [Stark Industries] Configure enterprise login

Hi CS team,

I need to configure enterprise login for my organization. Can you please do the necessary configurations to proceed?

My organization details are as follows:

 - Organization name: Stark Industries
 - Organization handle:  starkindustries
 - Email domains specific to my organization: “@stark.com”, “@starkindustries.com”, and “@stark.eu”

Thank you.

Note

You can choose to configure enterprise login for the API Platform Console, the API Platform Developer Portal, or both.

The API Platform support team will perform the necessary configurations and respond to you with a verification code. You must sign in to your domain host account and configure the DNS record for your email domain with the following values:

Field Value
Name/Host/Alias Specify @ or leave it blank
Time to Live (TTL) Keep the default value or use 86400
Value/Answer/Destination wso2-domain-verification:<verification_code>

Now, you are ready to bring your own identity to API Platform.

Bring your own identity to API Platform

When you create an organization in API Platform, an organization with the same name is provisioned for you in Asgardeo. To bring your own identity to API Platform, you must configure a federated enterprise IdP on Asgardeo in the organization that is provisioned for you.

Follow the steps given below to configure the federated IdP:

  1. Sign in to Asgardeo.
  2. To configure a federated enterprise identity provider for your Asgardeo organization, follow the steps in Asgardeo documentation - Add Standard-Based Login.
  3. In the Asgardeo Console left-hand menu, click Applications. You will see applications listed with the names, WSO2_LOGIN_FOR_BIJIRA and WSO2_LOGIN_FOR_BIJIRADEVPORTAL.

  4. In this example, we’ll configure an external identity for the API Platform Console.

  5. Click on the WSO2_LOGIN_FOR_BIJIRA application.
  6. Click the Sign-in Method tab. You can observe the configured connection.

Now, users in your enterprise IdP can sign in to the API Platform Console using their enterprise IDs.

Note

You can follow the same steps to configure the external identity for the API Platform DevPortal using WSO2_LOGIN_FOR_BIJIRADEVPORTAL Application.

Configure role-based access control for enterprise login

To streamline the enterprise login process and grant appropriate permission, API Platform provides the flexibility to configure role-based access control for users who reside in an external IdP.

To set up role-based access control for enterprise login within API Platform, follow the steps given below:

Prerequisites

Before you proceed with the configuration, make sure you complete the following:

  1. Configure enterprise login for your organization. For instructions, see Configure enterprise login for your API Platform organization.
  2. Ensure your enterprise identity provider includes the group/role attributes in tokens it sends to Asgardeo via the respective protocol.
  3. Be sure you have administrator privileges in API Platform.

Step 1: Configure Asgardeo

  1. Sign in to Asgardeo.
  2. Configure your IdP as an external IdP in Asgardeo. Depending on your IdP, you can select OpenID Connect or SAML as the protocol between Asgardeo and your IdP.

Note

If you are using OpenID Connect, configure the requested scopes accordingly for Asgardeo to get the relevant group/role details from the external IdP.

  1. To configure the application, follow the steps given below:

  2. In the Asgardeo Console left navigation menu, click Applications

  3. Click on the WSO2_LOGIN_FOR_BIJIRA or WSO2_LOGIN_FOR_BIJIRADEVPORTAL application that you want to configure
  4. Click the Sign-in Method tab.
  5. Configure the IdP for login depending on the protocol you selected:
  6. Click the User Attributes tab.
  7. Select the Groups attribute and click the arrow to expand the section. Then, select the Requested checkbox.
  8. Click Update.

  9. To add the user attributes as OpenID Connect scopes, follow the steps given below:

  10. In the Asgardeo Console left navigation menu, click Scopes.
  11. In the OpenID Connect Scopes pane, click OpenID to edit it.
  12. Click New Attribute and select the Groups attribute.
  13. Click Save and then click Save Changes.

Step 2: Map API Platform groups to enterprise IdP groups via the API Platform Console

Note

Before you map API Platform groups to enterprise IdP groups, ensure you meet the following criteria:

  • You have permission to perform actions of the organization administrator role.
  1. Sign in to the API Platform Console.
  2. In the API Platform Console, go to the top navigation menu and click Organization. This takes you to the organization's home page.
  3. In the left navigation menu, click Settings. This opens the organization-level settings page.
  4. In the Access Control tab, click Groups.

  5. Click Manage IdP Group Mapping. Group mapping

  6. Click the edit icon corresponding to the API Platform group you want to map to the enterprise IdP group.

  7. In the IdP Group Name field, specify the exact name you configured in the enterprise IdP and enter to add it.

    Tip

    If there is a change to the IdP group mapping, it takes effect from the next login session onwards.

  8. Click Save.

By following these steps, you have successfully configured role-based access control for enterprise login in API Platform, allowing users from the external IdP to have the appropriate permission.