LogoLogo
HomeIntegrityControlSolutionsManagement Center
3.1.0 - Access
3.1.0 - Access
  • Introduction
  • The Service
    • Overview
    • About this release
      • Release notes
      • Breaking changes
    • Architecture
      • Modules
      • Folder structure
      • Startup
    • Getting started
    • Installation
      • Container
      • Linux
      • Windows
    • Operations
      • Configuration
      • Metrics
      • Health check
      • Logging
        • System logging
        • Event logging
      • SBOM & license material
  • Modules
    • External modules
    • Internal modules
      • SAMLModule
      • OIDC
        • OpenID Configuration endpoint
        • JWKS endpoint
        • Authorization endpoint
        • Token endpoint
          • Authorization code
          • Refresh token
        • User info endpoint
        • Introspection endpoint
        • End session endpoint
  • Configuration reference
    • Introduction
    • Terms and abbreviations
    • Property expansion
    • File inclusion
    • Secrets management
    • Examples
  • Authenticators
    • Introduction
    • Common configuration
    • Web Authenticator API
    • Flow control
      • Selector
      • AuthController
      • SSO Authenticator
      • Chain
      • Impersonate
      • Impersonate With Search
    • Credential validators
      • SITHS eID
        • With QR or "app-switch"
      • BankID
        • On another device
        • On mobile device
      • Freja e-ID
        • With user input
        • With QR or "app-switch"
      • Mobile ID
        • With QR or "app-switch"
      • Header based
        • Certificate
      • Pointsharp Net iD Access server
        • On another device
        • On same device
      • Integrated windows login, IWA
      • User name & password
      • User lookup
      • OTP validator
      • Passkey validator
      • Exposed metrics
      • Test
        • Static SAML
        • No operation
    • Protocol managers
      • SAML
        • SAML IDP
        • SAML SP
        • IDP Discovery Service
      • OIDC
        • Authorization Code Flow
        • Implicit Flow
        • OIDC Relying Party
    • UI
Powered by GitBook
On this page
  • Lives within the AuthN module
  • Example
  1. Authenticators

Introduction

Authenticators are components that performs authentication. Authentication is the process of validating one or more credentials provided by an individual or a system to prove an identity. Credentials can be secret information like a PIN or a password, a private encryption key on a mobile phone, a fingerprint or a one time password issued by a hardware token or non secret information lika a username, internet address or a location.

Authenticators can be divided into three categories depending on their responsibilities:

  • Credential validators

  • Flow controllers

  • Protocol managers

Credential validators are responsible for validating credentials like password or BankID.

Flow controllers does not perform any actual validation of credentials, instead they are used for controlling the flow of an authentication consisting of more than one authenticator and they rely on credential validating authenticators to perform the actual validation of supplied credentials.

Protocol managers are flow controllers responsible for specific protocols like SAML or OIDC.

Using these three types of authenticators complex authentication flows containing validation of multiple credentials and user selections can be constructed.

Lives within the AuthN module

Configuring an authenticator is done by inserting them in an enclosing AuthN module in the "config.authenticators" property.

Example

Example below shows how one authenticator is configured.

{
      "name": "AuthN",
      "config": {
        "http_context": "/authn",
        "authenticators": [
          {
            "id": "portal",
            "type": "NoOp",
            "config": {
              "http_context": "/pwdreset/authn",
              "context_path": "/login",
              "subject": "lord_helmet",
              "success_location": "/pwdreset/"
            }
          }
        ]
      }
    }

PreviousExamplesNextCommon configuration