Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Forms is a comprehensive Identity and Access Management (IAM) solution designed to streamline and adapt to the specific workflows of your organisation.
The modern landscape of IAM requires a balance between automation and control, and Forms offers both in a way that aligns with your internal processes. IAM solutions today need to be flexible enough to manage the complexity of access control across an organisation, especially as digital environments become more intricate and regulated. Forms IAM addresses this by providing customisable workflows that can be fully automated or augmented with manual checkpoints, ensuring both efficiency and accuracy. This flexibility is crucial in industries with stringent compliance requirements, where every access decision needs to be carefully monitored and validated. Forms IAM is available both on-premises and in the cloud, giving you the flexibility to deploy the solution in the environment that best suits your infrastructure and security requirements. Whether you are looking to maintain full control over your data in an on-prem deployment or leverage the scalability and convenience of the cloud, Forms IAM adapts to your strategy.
Additionally, Forms IAM integrates seamlessly with a wide range of common identity providers and data sources, including Entra ID (formerly Azure Active Directory), Google Cloud Identity, Microsoft Azure, Active Directory, and other leading platforms. This ensures that you can easily manage and centralise access controls across your existing ecosystems, without the need for complex custom integrations. The system allows administrators to configure workflows to match existing processes within the company. Whether it’s handling new employee onboarding, access revocation, or ongoing entitlement reviews, each flow can be automated for speed or include manual approval steps for sensitive actions. This adaptability ensures that the solution integrates seamlessly with your organisation’s existing protocols, rather than forcing a rigid, predefined process onto your teams. With scalable operations, capable of managing identity and access across both small businesses and large enterprises, Forms IAM can evolve alongside your organisation as it grows or its requirements change. In today’s rapidly evolving security environment, having a robust yet flexible IAM system like Forms ensures that your organisation can handle access control efficiently while maintaining the level of precision and oversight necessary for security and compliance.
Other products in the Control family apart of Fortified ID Forms.
Automation provides the ability to read data from one or more systems, change or influence the data and then write it to one or more source systems. Examples could be reading data from an HR system and looking for newly created users, reading in these users and creating them in, for example, Active Directory, Google or Microsoft Entra ID. All without the influence of an administration or user.
Attest adds for Forms and Automation the ability to bring in approval flows. Instead of a user being created/changed directly, one or more users must approve this change.
An example could be requesting access to a group that protects a resource where, for example, a group administrator/owner must approve who gets access to the resource.
The solution can be installed locally, in the cloud or as a hybrid solution. The ability to easily move the solution between test and production environments has been made extremely easy. Read more about automation in our technical documentation.
Password Reset from Fortified ID simplifies the management of secure password reset for your organization.
Users can easily and securely create a new password through self-service without having to contact their employer's IT support.
Users with personnel responsibility (manager, teacher, partner/consultant manager) can reset passwords on behalf of another user.
Your organization becomes more efficient as the time that the end user does not have access can be greatly shortened. In addition, IT personnel can also devote themselves to more constructive and proactive work.
Check the release notes to discover the latest updates and improvements in this version.
If there are any breaking changes included in this release, carefully review them before upgrading to understand how they may impact your installation and to prepare for any necessary adjustments before or after the upgrade.
Here we address changes that may cause previously working configurations to stop working after the update, if they are not adjusted to handle the changes below.
By default accessing a Flow requires authentication. Any authentication is expected to be handled by a trusted SAML IDP. Once authenticated, authorisation is based on the incoming SAML assertion.
In order for authentication to work, a SAML SP authenticator needs to be configured. Also, SAML SP need to share first part of URI in with Forms module.
Forms module has "http_context" configured to "/forms". The SAML must have it's "http_context" set to "/forms/xxx" ("/forms/auth" is a good pattern).
Typically the properties regarding authentication in Forms module will look something like this:
On the SAML SP side configuration will look like this:
Once the user is authenticated data from incoming assertion vill be transfered to the session.
NameID vill be the users login identifier. Other attributes will be put in the session where multivalued attributes is merged into a comma separated list.
Once authenticated all users by default can access a Flow. Restricting is based on roles attribute in the incoming assertion. By using the "requires_role" configuration parameter on the Flow restriction control is performed comparing the incoming "roles" in the assertion and data in "requires_role" for the Flow.
One value of "role" must match "requires_role" in order for user getting access.
The smallest building block in a flow. Typically a Control is represented by some kind of visual component together with data from some data source.
Two categories of controls are available:
Basic
Advanced.
Basic controls are comparable to simple HTML inputs, such as checkboxes.
Advanced controls are more like mini-applications with specific goals. For example, they could display a list of Entra-ID users or groups as the first step in a Flow.
Both types are implemented on the front-end using react-jsonschema-form.
All controls follow the same structure:
type: Defines what control to be used.
id: Unique identifier to the current flow. In subsequent pipe calls the id is sent to the pipe along with value(s) from the control and accessed in the piped using {{request.<id>}}
config: Block of control-specific configuration. Se each control for appropriate values.
data: Value to be injected in control.
ui: Any additional ui-related data sent to frontend, unfiltered. See https://rjsf-team.github.io/react-jsonschema-form/ UISchema for more information. Typically this is used for layout management.
schema: Any additional control-related data not available in current control implementation.
Data binding is typically done using "data" configuration for a control. Most likely date is set by using some template {{flow.givenName}}.
Not all controls rely on data. Read documentation for appropriate control.
Overview of Fortified ID Forms
Forms is an application for digitizing process flows. Examples can be creating users (e.g. employees, consultants, partners), editing users or listing "my users" or "my groups". With Forms you get access to a tool to create web-based flows to delegate the administration to the users responsible for certain information in a simple way.
With Forms, you can also build self-service flows and self-registration of users. In case of self-registration, a user proves himself with e.g. BankID where information is extracted and used to allow the user to create their own account.
We have a number of movies on how to work with forms in different scenarios. (note. All movies are in Swedish.)
Advanced controls are more like mini-applications with specific goals. For example, they could display a list of Entra-ID users or groups as the first step in a Flow.
Basic controls are comparable to simple HTML inputs, such as checkboxes.
Steps are comparable to pages in a form, where each step includes sections that focus on a specific area. By linking steps, one can create highly customizable IAM solutions.
A step is represented by a json object. Steps can be loaded from one json file or multiple files. Recommended setup is to keep each step in a single file. This will simplify configuration and overview.
Text shown in browser tab. Overrides overlay.
Forms - Fortified ID
Sort order of step. Omitting will result in undetermined execute order.
N/A
0
Favicon for this step.
Internal FortifiedID icon
Same as Flow but can override in a step
Empty array[]
List if controls for this step
N/A
Pipe to be executed moving to next step.
N/A
Same as for flow but can override in a step.
See Flow
Example step to create a user.
Example step to edit and find users.
Example with all main properties.
If configured, execution of a pipe is done with all data available to the step. This means data will vary depending on what step is executed.
Data from all previous executed steps will be sent to pipe and accessed in pipes using {{request. pattern.
In order to be able to access any data returned from a pipe, return a single item in a pipe.
Data will available using {{flow.xxx}} pattern.
See a Flow as an app. It defines things like number of steps, path of access and if it is public or protected by authentication. A Flows aims to guide end-users performing a well defined IAM task.
The Flow is defined by a JSON file. Name of the file can be anything, but flow.json is a recommended name. Format of the data inside must be either JSON or JSONC. The flow.json file will be picked up, loaded and exposed by the Forms module.
Last part of the URL how to access the flow. Must be unique within the forms module.
N/A
If flow can be accessed without any authentication (true/false).
false
Array of named roles user must have in order to access the flow, "one of"
Empty array: []
Should progress bar be visible (true/false).
true
Should user menu be visible (true/false).
true
Additional logging options. Note. This can be added to forms module and will then be available in all flows.
Empty array []
Steps to include for the flow. Recommendation is using @include directive for better overview.
Empty array []
Pipe executed before first step.
N/A
Pipe to execute when last step is complete.
N/A
Step used after last regular step is executed with success. Used for user notification etc. Do not out any logic here.
N/A
Step used after last regular step is executed with with failure. Used for user notification etc. Do not out any logic here.
N/A
Should next button be enabled (true/false).
true
Text on "Next" button
Next
Should save button be enabled (true/false).
true
Text on "Save" button
Save
Should restart button be enabled (true/false).
true
Text on "Restart" button
Restart
Sometimes it is necessary to perform some kind of logic before first step is rendered. Typically used for validation and or collecting data reqired in step 1.
For case like this use pre_pipe.
In order to consume data in subsequent steps, make sure the pipe returns one item. Data in this item will be accessible using {{flow.xxx}}
The key components and how they relate to each other.
On a high level, Forms delivers well defined "apps" with the soul purpose simplifying a process related to an "IAM-problem". Each app is called a Flow. A Flow have a set of basic properties. For example who may access, is it public, how do it consume authentication.
Flow consists of a number of Steps. Each Step aims to guide the end user through the process. A simple Step could just consists of read only data about a user or a group.
Every Step includes a number of Controls. A Control is some kind graphical entity used to let users read or write data. Just like a Flow or a Step a Control has a number of properties that will define it's behaviour.
By combining Flow, Step & Control small well-defined IAM apps can be built fast with instant added value.
When a user wants to do something in the UI, such as retrieve or write data to a data source or process data, a pipe can be used. A pipe consists of a number of valves that can retrieve, write or process data. Pipes and valves are something that is found in all Fortified ID products and are shared between the products, so if you have knowledge of this from one of our other products, it works the same in Forms.
Forms comes with ha default layout. It places controls from left to right.
All steps and summary pages use a layout grid with a base column width of 12. All controls, or children, can be specified to have different sizes and multiple breakpoints for different screen sizes.
All controls (or children of the grid) have a base width of 12, meaning that they fill the entire width of the grid. A child with the width of 6 will occupies half of the grid, a child with the width of 8 will occupy 2/3s of the grid.
The grid will fill its columns from left to right and fit up to 12 columns in each "row".
Sizes for the controls can be set in the ui [SKRIV HÄR, måste kanske ändra en grej i hur man konfar kommer jag på nu.]
All controls will be rendered into the layout according to the order that they are defined.
Each breakpoint (a key) matches with a fixed screen width (a value):
xs, extra-small: 0px
sm, small: 600px
md, medium: 900px
lg, large: 1200px
xl, extra-large: 1536px
For more advanced layout options you can also configure a "ui:grid"
property on the ui for the step.
Using the "ui:grid"
all other rendering will be bypassed, and only items found in the "ui:grid"
will be rendered.
With "ui:grid"
it is also possible to nest grids.
An input field control, similar to an HTML input.
Below is a screenshot of the control. This is from a create step where an admin has added Clarke and Kent in two input controls. Email and Mobile number has no value yet.
Scenarions when the control can be used:
Like above when an admin creates a new object and needs to add data about the object. You can add data controllers to an inout control to verify correct syntax, an @ for email adress, no characters for an mobile number.
You like to display data about an object. You search an LDAP directory and display a user with data about the user. The input control can be in edit or read-only mode.
A value picker component, that lets the user select a given value from a list.
The ValuePicker is often used as a drop-down list for admins to select predefined values from. See example below.
Markdown is a lightweight markup language that you can use to add formatting elements to a step.
Add one or several labels and/or descriptions text elements to a step. Example below shows a markdowns example, one label and one description.
The example can be added as one markdown or two separate markdowns.
Note. When using several markdowns in one step, make sure the id is unique.
Markdown is a lightweight markup language that you can use to add formatting elements to a step.
This from a step where two lines of text, one heading and one paragraph with a line break between, using one markdown control.
This an example where three different markdowns are used in the same step. Note that each markdown need a unique id.
This an example with one markdown using lang-file to add data from a previous step. It combines string and variable data. For example. "You have selected Donald Duck." where Donald Duck is data from a previous step.
The top example is from a step. The below example is from a language file., en.json.
Click following link for a number of examples on how to use markdown in a step.
Properties for Input control
This is an example from a create step where values ​​are to be added. Mail and mobile have checks for correct syntax.
This is an example from a create step where values ​​are to be added from a session. In this scenario a user has logged in using Swedish BankID.
This is an example from a step where values ​​are to be added from a previous step or from a pipe in a previous step.
The 'config.type' determines how the control is displayed in the view.
For the type 'string' the field can be validated before it is sent to the pipe or next step. The 'strict' validation is recommended as it blocks several common special characters not suitable for Pipe/Valve data handling. Postal is post address.
A value picker component, that lets the user select a given value from a list.
Use to find objects in data store, e.g. Active Directory. It performs searches using pipes and stores a selected value for next steps to consume.
Control type: Selector
To populate list of items in UI a pipe must be executed. List of items returned should at least contain properties defined in columns.
Data sent to pipe is:
search - containing user input if config -> search is set to true
columns - comma separated string of defined columns
Return data must be in a form of a list of items.
When pressing Select, data exposed to flow is found using key if control id. Value is item id returned from pipe
Update group membership for a selected user.
An LdapClient module deployed with matching name as defined in "namespace".
Control type: ActiveDirectoryUserEditGroupMember
This control works in conjunction with LdapClient module. It must be installed.
Object array, "ad_pending_remove" - contains data on what groups to remove from user.
Object array, "ad_pending_add" - contains data on what groups to add to user.
Array data will have the syntax:
Valves used in finalize pipe
ActiveDirectoryAddMemberToGroups
Used to add a single group member to groups
ActiveDirectoryRemoveMemberFromGroups
Used to remove a single group member from groups
Manage group members for a selected Active Directory group.
An LdapClient module deployed with matching name as defined in "namespace".
This control works in conjunction with LdapClient module. It must be installed.
Object array, "ad_pending_remove" - contains data on what members to remove from group.
Object array, "ad_pending_add" - contains data on what members to add to group.
Example data in finalize pipe:
ActiveDirectoryAddGroupToMembers
Used to add group members to a specified group
ActiveDirectoryRemoveGroupFromMembers
Used to remove group members from a specified group
Use to select one option from a list that is populated from the result of an LDAP query.
The search filter is a template that has access to all data that is available in the flow. Additionally, the template can use the parameter search_query
, that contains the user input.
The attributes defined by display_key
and value_key
are always queried.
Use to select one option from a list that is populated from the result of an LDAP query.
Below is a screenshot of the control. This is from a create step where an admin like to choose a manager for a user to be created.
Update group membership for a selected user.
Use this control to manage groups for a selected user. Note. To select the user, which often is done in a previous step, use the control Selector.
Use to find objects in data store, e.g. Active Directory. It performs searches using pipes and stores a selected value for next steps to consume.
Edit Entra ID group, update group members
Use this control to manage users for a selected group. Note. To select the user, which often is done in a previous step, use the control EntraGroupSelect.
An Entra ID module deployed with matching name as defined in "namespace".
An Entra ID identifier, "selected_entra_id", located in either session or flow. Data is taken from session first and flow second. selected_entra_id must reference a Entra ID group.
Edit Entra ID user, update group membership.
Use this control to manage groups for a selected user. Note. To select the user, which often is done in a previous step, use the control EntraUserSelect.
An Entra ID module deployed with matching name as defined in "namespace".
An Entra ID identifier, "selected_entra_id", located in either session or flow. Data is taken from session first and flow second. selected_entra_id must reference a Entra ID user.
Find an Entra ID user based on search data
The configuration is divided in two blocks, config
& ui
where config parameters are marked as config.<parameter name>
and ui parameters are marked as ui.<parameter name>
.
See the Example tab for a full example.
In this scenario the grid will contain two columns. The query will also be executed before grid is displayed. This is what "ui:search": false will do, if you add true the grid will let you add Bob* before search is executed.
In addition to example 1 this grid will also contain the manager of the users returned.
This control works in conjunction with EntraID module. It must be installed.
Set owned_users_only_attribute will cause control match the data from owned_users_only_attribute. Matching is done using data from owned_users_only_attribute and entra_identifier.
entra_identifier is read from session or flow. Session read first then flow.
Settings "owned_users_only_attribute":"manager", will match value from entra_identifier with id in "manager". Only showing users where user is set to owner.
"selected_entra_id" - id of selected group
"selected_entra_displayName" - display name of selected group.
Find an Entra ID user based on search data
Use to display text from a text file. Markdown is supported as well as templating: {{flow.xxxx}} etc. Currently translation is not supported
Use to display text from a text file. Markdown is supported as well as templating: {{flow.xxxx}} etc. Currently translation is not supported
Edit Entra ID user, update group membership.
The configuration is divided in two blocks, config
& ui
where config parameters are marked as config.<parameter name>
and ui parameters are marked as ui.<parameter name>
.
See the Example tab for a full example.
In this example grid will have two columns.
In this example the grid will have three columns where the owner columns contain the user managing the group.
This control works in conjunction with EntraID module. It must be installed.
Object array, "entra_pending_remove" - contains data on what groups to remove from user.
Object array, "entra_pending_add" - contains data on what groups add to user.
Array data will ha the syntax:
[{"id":"1234567","displayName":"Group 1"}]
Find an Entra ID group based on search data
To install on Windows, click the following link:
When installation is completed, verify the following:
In Windows Services, verify that Fortified ID Forms service exists
In file system, verify that drive:\Program Files\FortifiedID\forms exits
By default Forms use HTTP port 8080.
Access http://<host:8080>/forms/demo1 or http://<host:8080>/forms/demo2
Using a docker container
Verify using:
By default Forms use HTTP port 8080.
Access http://<host:8080>/forms/demo1 or http://<host:8080>/forms/demo2
Used as a robot mitigator. How long before a step is allowed to be posted back to the server. Format conforms to
Click following link for a number of examples on how to use markdown in a step.
type
Control implementation, must be Markdown
N/A
id
Unique ID within the flow
N/A
data
Text to display
N/A
type
Control implementation
N/A
id
Unique ID within the flow
N/A
data
Value to display from session or flow. {{{flow.attribute}}} {{{session.attribute}}}
N/A
config.required
Must have a value when leaving the step. true
/false
false
config.readonly
Open to edit by enduser. true/false
false
config.type
Type of input value. Valid JSON types are: string, number, integer, boolean.
"string"
schema.format
Validation of input data. Valid checks: strict, email, phone, postal. See below for more info.
N/A
type
Control implementation. Must be ValuePicker
N/A
id
Unique ID within the flow
N/A
config.required
Must have a value when leaving the step. true
/false
false
config.readonly
Open to edit by enduser. true
/false
false
config.default_value
This value is selected per default
config.options
Select options (array of JSON objects).
N/A
config.options.title
An option title
N/A
config.options.value
An option value
N/A
pipe_id
Id of pipe searching for objects
Same as control id
columns
What columns to be displayed in UI.
N/A
submit_on_change
Should selection of an item move to next step. true
/false
true
search
Should user be able to enter custom search data.
false
readonly
Should control be readonly?
false
namespace
Identifier of LdapClient module to use
"default"
columns
List array with columns to display
["cn","description"]
change_is_required
Force admin to update user, true
/false
false
base_dn
Search base DN.
"DC=company,DC=local"
scope
Search scope.
"SUB"
current_filter
Search filter. Used to fetch all groups the the user is a member of.
N/A
available_filter
Search filter. Used to fetch available groups.
N/A
type
Must be
ActiveDirectoryGroupEditGroupMember
N/A
config.namespace
Identifier of LdapClient module to use
"default"
config.columns
List array with columns to display
["displayName", "mail", "mobile"]
config.base_dn
Search base DN.
"DC=company,DC=local"
config.scope
Search scope.
"SUB"
config.current_filter
Search filter. Used to fetch current members of the group.
N/A
config.available_filter
Search filter. Used to fetch available members of the group.
N/A
type
Must be ActiveDirectorySingleSelect
N/A
config.required
Must have a value when leaving the step. true
/false
false
config.readonly
Open to edit by enduser. true
/false
false
config.base_dn
Search base DN
config.scope
Search scope
config.attributes
Query these attributes
config.pre_filter
Display current value if present
config.filter
Query filter
config.display_key
This attribute is displayed to the user
config.value_key
This attribute is the selected value.
type
Backend implementation. Must be Attestor
N/A
type
Must be EntraGroupSelect
N/A
config.namespace
Identifier of EntraID module to use
"default"
config.columns
List array with columns to display
["displayName", "mail", "mobilePhone", "companyName", "department"]
config.search_attributes
List array with columns used for searching. Search is done using "starts with".
["displayName","mail"]
config.owned_users_only_attribute
If set, users will be filtered based on the attribute.
N/A
ui.ui:search
Should search input be visible for end user, true/false
true
ui.ui:submit_on_change
Should selection of an item move to next step. true/false
false
type
Backend implementation
N/A
config.file_template
File to load
N/A
type
Must be EntraUserEditGroupMember
N/A
config.namespace
Identifier of EntraID module to use
"default"
config.columns
List array with columns to display
["displayName","description"]
config.change_is_required
Force admin to update user, true
/false
false
config.owned_groups_only
If set, groups will filtered based on the attribute.
false
config.owner_entry_id_key
Where to find the owner. If owned_groups_only
is true
. Configured value is taken from session or flow. First session, flow second.
"entra_owner"
ui.ui:submit_on_change
Should selection of an item move to next step. true
/false
false
Find an Entra ID group based on search data
The configuration is divided in two blocks, config
& ui
where config parameters are marked as config.<parameter name>
and ui parameters are marked as ui.<parameter name>
.
See the Example tab for a full example.
type
Must be EntraGroupSelect
N/A
config.namespace
Identifier of EntraID module to use
"default"
config.columns
List array with columns to display
["displayName","description"]
config.search_attributes
List array with columns used for searching. Search is done using "starts with".
["displayName","mail"]
config.owned_groups_only_attribute
If set, groups will filtered based on the attribute.
N/A
ui.ui:search
Should search input be visible for end user, true
/false
true
ui.ui:submit_on_change
Should selection of an item move to next step. true
/false
false
In this scenario the grid will contain two columns. The query will also be executed before grid is displayed. This is what "ui:search": false will do, if you add true the grid will let you add Bob* before search is executed.
In addition to example 1 this grid will also contain the owners of the groups returned.
This control works in conjunction with EntraID module. It must be installed.
Set owned_groups_only_attribute will cause control match the data from owned_groups_only_attribute. Matching is done using data from owned_groups_only_attribute and entra_identifier.
entra_identifier is read from session or flow. Session read first then flow.
Settings "owned_groups_only_attribute":"owner", will match value from entra_identifier with id in "owner". Only showing groups where user is set to owner.
"selected_entra_id" - id of selected group
"selected_entra_displayName" - display name of selected group.
To install on Linux, click the following link:
https://docs.fortifiedid.se/installation/linux
By default Forms use HTTP port 8080.
Access http://<host:8080>/forms/demo1 or http://<host:8080>/forms/demo2
The Pipe module refer to the pipes used for each flow.
Module name: Pipes
A number of modules are included but may not be required in all scenarios.
AuthN, version 2024.93 - details is found here https://docs.fortifiedid.se/authn
Pipes, version 2024.115 - details are found here https://docs.fortifiedid.se/pipes/
Http client, version 2024.72 - details is found here https://docs.fortifiedid.se/httpclient/
JDBC client, version 2024.72 - details are found here https://docs.fortifiedid.se/jdbcclient/
Ldap client, version 2024.72 - details are found here https://docs.fortifiedid.se/ldapclient/
CEF module, version 2024.72 - details is found here https://docs.fortifiedid.se/cef/
Node module, version 2024.72 - details is found here https://docs.fortifiedid.se/node/
SMTP module, version 2024.72 - details are found here https://docs.fortifiedid.se/smtp/
Entra ID module, version 2024.35 - details are found here https://docs.fortifiedid.se/entraid
Workflow module, version 2024.58 - details are found here https://docs.fortifiedid.se/workorders
Only Node is started by default. Modules have to be added in the configuration in order to be started.
Edit Entra ID group, update group members
type
Must be EntraGroupEditGroupMember
N/A
config.namespace
Identifier of EntraID module to use
"default"
config.columns
List array with columns to display
["displayName", "mail", "mobilePhone", "companyName", "department"]
config.change_is_required
Force admin to update user, true
/false
false
config.exclude_id
Typically the id of current user. ID will not be visible. Configured value is taken from session or flow. First session, flow second.
N/A ("")
config.readonly
Should control be readonly?
false
In this example the grid will have five columns.
This control works in conjunction with Entra ID module. It must be installed.
Object array, "entra_pending_remove" - contains data on what groups to remove from user.
Object array, "entra_pending_add" - contains data on what groups add to user.
Array data will ha the syntax:
[{"id":"1234567","displayName":"Group 1"}]
This will describe how to configure a flow using attestation
WorkOrder module deployed.
Create a flow used for attestation (accept/reject) using Attestor control.
Configure last PIPE sending data to work order database and possible notifying user.
Configure one accept pipe to be executed once the work order is attested
Configure one reject pipe to be executed if order is rejected
Instead of performing updates directly, data used must be send to work-order database. Two thing are required for this:
A PDF file used to visualise what is about to happen if accepted. Either use Html2Pdf valve for dynamic creation or use a static PDF file.
In the last PIPE in the flow use
Once all attesters accepted the work order, accept pipe will be executed. Any flow data from order creation is present along with additional static data.
Accessing data sent from "work flow accept" is done using pattern {{request.xxx}}
Note that the accept pipe is executed in system context. No session with user data will be present.
It only takes one attester to reject for the order to be rejected. Once rejected the reject pipe is executed. Here you can configure notification if desired.
Any form can be configured for attestation. In essence just send the collected form data to attestation persistence and let one ore more persons verify and reject or accept.
Certain operations or flows may be deemed sensitive or require additional oversight before proceeding. This is where attestation might come in handy.
Attestation lets you define manual oversight be one ore persons before any kind of automation is performed.
Attestation is a flow and defined using built in functionality.
Attestors are notified via email, with the relevant data for verification packaged in a PDF file. Each PDF is tailored specifically for its respective flow, making the information clear, accessible, and easy to review. After a flow is successfully attested, the PDF document can be sent to an external archiving system for secure, long-term storage. This process ensures that all documentation is systematically preserved and readily available for future reference or audits.
This section includes the main parameters for the Pipe module.
name
Must be Pipes
config.pipes
Location of pipes for each flow
N/A
The Forms module is, apart from delivering it's functionality, also a HTTP modul which means it inherits much configuration from basic HTTP module.
Module name: Forms
Generic HTTP module configuration is found here https://docs.fortifiedid.se/modules/configuration
Forms module handles loading of multiple Flow. Multiple instances of Forms module can be deployed.
Please refer to the common configuration of for information on how to change the look and feel of Forms.
This section includes the main parameters for the Forms module.
name
Must be Forms
N/A
config.http_context
What context is application served under.
"/forms"
config.webroot_dir
Where to load web resources from.
"web"
config.http_auth_redirect_url
Where to send the user for authentication
"/forms/authn/login"
config.logout_endpoint_url
Overrides default logout, click for more info.
config.overlay_dir
Where to load the overlayed resources from.
N/A
config.flows
An array with file path to flows to be loaded. Recommended is using @include directive.
N/A
config.verbose_logs
Array with string values. Possible values are
"flow"
,"session"
,"controls"
[]