LogoLogo
HomeIntegrityControlSolutionsManagement Center
3.1.0 - Access
3.1.0 - Access
  • Introduction
  • The Service
    • Overview
    • About this release
      • Release notes
      • Breaking changes
    • Architecture
      • Modules
      • Folder structure
      • Startup
    • Getting started
    • Installation
      • Container
      • Linux
      • Windows
    • Operations
      • Configuration
      • Metrics
      • Health check
      • Logging
        • System logging
        • Event logging
      • SBOM & license material
  • Modules
    • External modules
    • Internal modules
      • SAMLModule
      • OIDC
        • OpenID Configuration endpoint
        • JWKS endpoint
        • Authorization endpoint
        • Token endpoint
          • Authorization code
          • Refresh token
        • User info endpoint
        • Introspection endpoint
        • End session endpoint
  • Configuration reference
    • Introduction
    • Terms and abbreviations
    • Property expansion
    • File inclusion
    • Secrets management
    • Examples
  • Authenticators
    • Introduction
    • Common configuration
    • Web Authenticator API
    • Flow control
      • Selector
      • AuthController
      • SSO Authenticator
      • Chain
      • Impersonate
      • Impersonate With Search
    • Credential validators
      • SITHS eID
        • With QR or "app-switch"
      • BankID
        • On another device
        • On mobile device
      • Freja e-ID
        • With user input
        • With QR or "app-switch"
      • Mobile ID
        • With QR or "app-switch"
      • Header based
        • Certificate
      • Pointsharp Net iD Access server
        • On another device
        • On same device
      • Integrated windows login, IWA
      • User name & password
      • User lookup
      • OTP validator
      • Passkey validator
      • Exposed metrics
      • Test
        • Static SAML
        • No operation
    • Protocol managers
      • SAML
        • SAML IDP
        • SAML SP
        • IDP Discovery Service
      • OIDC
        • Authorization Code Flow
        • Implicit Flow
        • OIDC Relying Party
    • UI
Powered by GitBook
On this page
  • Configuration
  • Logging
  • Data exposed to global state
  1. Authenticators
  2. Credential validators
  3. Mobile ID

With QR or "app-switch"

This authenticator expects users either scan a QR code or "app-switch".

PreviousMobile IDNextHeader based

Configuration

This is the configuration for the TaskViewAuthenticator

Authenticator type: TaskViewAuthenticator

Common Authenticator configuration can be found .

Name
Description
Default value
Mandatory

internal_http_destination

ID of the internal http client used to talk with backend.

"default"

username_parameter

Parameter to where the username is exported.

"username"

server_api_url

Address to the mobile server api module.

N/A

timeout_seconds

Time to live before the authenticator expires (0 is forever)

0

task_form

The task-form to be used in the authentication.

N/A

webroot_dir

See common authenticator configuration

web/mobileid/taskviewauthenticator

{
	"id": "myauth01",
	"type": "TaskViewAuthenticator",
	"config": 
	{
		"webroot_dir": "web/mobileid/taskauthenticator",
		"server_api_url":"http://192.168.86.27:7001/mos",
		"require_chain": false,
		"timeout_seconds":120,
		"username_parameter":"username",
		"context_path" : "/login/authn/login",
		"success_location": "http://www.google.se",
		"failure_location": "/login/authn/login/logout",
		"cancel_location": "/login/authn/login/logout",
		"task_form":
		{
	    		"elements":
    			[
	      			{"id":"1","type":"label","value":"Confirm your login"},
	      			{"id":"2","type":"button_confirm","value":"Confirm"},
	      			{"id":"3","type":"button_reject","value":"Reject"}
	    		]
		}
	}
}

Logging

Apart from system logging, event logging is done when starting, completing, and failing a transaction.

Event ids are:

  • MOBILE_ID_100101("MobileID authentication started")

    • IDENTIFIER (session trace id)

  • MOBILE_ID_100102("MobileID authentication completed")

    • IDENTIFIER (session trace id)

    • SOURCE_USER_NAME (user subject)

  • MOBILE_ID_100103("MobileID authentication rejected")

    • IDENTIFIER (session trace id)

  • MOBILE_ID_100104("MobileID authentication canceled")

    • IDENTIFIER (session trace id)

  • MOBILE_ID_100105("MobileID authentication expired")

    • IDENTIFIER (session trace id)

Data exposed to global state

After a user completes a transaction, the authenticator is marked as done. Data from the authentication response is then put into the global state, replacing existing values:

  • "username_parameter" set to user subject

here