Note: this component stores cluster-wide configuration data and is mirrored across all servers in the topology within the the same cluster.
Note: changes to cluster-wide configuration objects are immediately and automatically mirrored across all servers within the same cluster, so offline changes are not supported.
Third Party Identity Authenticators provide custom Identity Authenticator implementations created in third-party code using the UnboundID server SDK.
↓Parent Component
↓Properties
↓dsconfig Usage
The Third Party Identity Authenticator component inherits from the Identity Authenticator
The properties supported by this managed object are as follows:
Basic Properties: | Advanced Properties: |
---|---|
↓ description | None |
↓ authentication-method-reference | |
↓ schema-urn | |
↓ extension-class | |
↓ extension-argument |
Description | A description for this Identity Authenticator |
Default Value | None |
Allowed Values | A string |
Multi-Valued | No |
Required | No |
Admin Action Required | None. Modification requires no further action |
authentication-method-reference
Description | Specifies identifiers of the authentication methods provided by this Identity Authenticator. Each value is exposed in the "amr" (authentication method reference) claim in an ID token, and also the "lastLoginMethods" and "lastSecondFactorMethods" properties of a user session SCIM sub-resource. |
Default Value | None |
Allowed Values | A string |
Multi-Valued | Yes |
Required | No |
Admin Action Required | None. Modification requires no further action |
Description | The URN which identifies the SCIM extension schema that should contain attributes intended for this Identity Authenticator in authentication request and response messages. |
Default Value | None |
Allowed Values | A URN begins with 'urn:', is followed by a namespace component that is no more than 32 alpha-numeric characters long, which is followed by one or more colon-delimited identifiers consisting of legal URN characters (letters, digits, and characters in '()+,-.:=@;$_!*'). For example, a URN in the 'acme' namespace might be "urn:acme:identity:User.name". |
Multi-Valued | No |
Required | Yes |
Admin Action Required | None. Modification requires no further action |
Description | The fully-qualified name of the Java class providing the logic for the Third Party Identity Authenticator. |
Default Value | None |
Allowed Values | The fully-qualified name of a Java class that extends or implements com.unboundid.directory.sdk.broker.api.IdentityAuthenticator |
Multi-Valued | No |
Required | Yes |
Admin Action Required | None. Modification requires no further action |
Description | The set of arguments used to customize the behavior for the Third Party Identity Authenticator. Each configuration property should be given in the form 'name=value'. |
Default Value | None |
Allowed Values | A string |
Multi-Valued | Yes |
Required | No |
Admin Action Required | The Data Governance Broker must be restarted for changes to this setting to take effect. Changes to this property will not take effect until the server is restarted. |
To list the configured Identity Authenticators:
dsconfig list-identity-authenticators [--property {propertyName}] ...
To view the configuration for an existing Identity Authenticator:
dsconfig get-identity-authenticator-prop --authenticator-name {name} [--tab-delimited] [--script-friendly] [--property {propertyName}] ...
To update the configuration for an existing Identity Authenticator:
dsconfig set-identity-authenticator-prop --authenticator-name {name} (--set|--add|--remove) {propertyName}:{propertyValue} [(--set|--add|--remove) {propertyName}:{propertyValue}] ...
To create a new Third Party Identity Authenticator:
dsconfig create-identity-authenticator --authenticator-name {name} --type third-party --set schema-urn:{propertyValue} --set extension-class:{propertyValue} [--set {propertyName}:{propertyValue}] ...
To delete an existing Identity Authenticator:
dsconfig delete-identity-authenticator --authenticator-name {name}