Use Cases
HomeIntegrityControlManagement CenterSolutions
  • Get Started
  • Integrity | Access
    • Auth. methods
      • LDAP (Username/Password)
      • LDAP (Username/Password) + OTP (SMTP)
      • LDAP (Username/Password) + OTP (SMS)
      • Swedish BankID
      • Microsoft Entra ID (SAMLSPBroker)
      • Foregin eID (SAMLSPBroker)
    • Auth. methods (SAML)
      • One-Time Password (OATH)
      • Inera IdP (SITHS) (SAMLSPBroker)
      • ID-porten (Norway) (SAML IdP with OIDC RP)
      • Multiple SAML IdP's configured
        • Multiple JSON files
    • Auth. methods (OIDC)
      • Static values (OIDC) - Test only
      • Swedish BankID (OIDC)
      • UID/PWD (OIDC)
    • Auth. methods (MISC)
      • Selector filtering
      • AuthZ control
      • External links and Cancel location
    • Add a Federation or SAML SP
  • Integrity | Portal
    • Portal
  • Integrity | Enrollment
    • Software token (OATH)
    • Best practice configuration
  • Integrity | Radius
    • UID/OATH token
    • UID/Password/OATH token
    • UID/Password/SMTP
  • Integrity | API
    • Swedish Siths eID
    • Oath Token
  • Control | Applications
    • Password Reset
    • Password Reset for Entra ID
    • Password Reset for Google Workspace
  • OPERATION
    • Rolling upgrade - cluster
  • TROUBLESHOOTING
    • Wrong relaystate
  • Misc
    • Address configuration externally
    • ADFS
      • Protect Fortified ID apps
      • Install and configure Fortified ID ADFS adapter for Siths eID
      • Install and configure Fortified ID ADFS adapter for Oath
    • AWS
      • Protect AWS Cognito with eID MFA
      • Protect AWS IAM Identity Center with eID MFA
    • Customization
      • Overlay - WEB
      • Overlay - Portal
      • Overlay - Password Reset
      • Overlay - Enrollment
      • Logout page
    • Dependency-Track - protect with eID MFA and SSO
    • Digitala Nationella Prov (DNP) / Skolfederation
      • Active Directory Federation Services (ADFS) with BankID as step-up-method
      • Active Directory / LDAP with BankID as step-up-method
      • Entra ID (Azure AD) with BankID as step-up-method
      • Google with BankID as step-up-method
      • Generate eduPersonPrincipalName (eppn) and store in Google
      • Generate eduPersonPrincipalName (eppn) and store in Entra ID
      • Common configuration
    • Encrypt configuration secrets
    • Microsoft Entra
      • Protect Entra ID (Azure AD) with eID MFA
      • Entra External - Support for eID (SAML)
      • Entra External - Support for eID (OIDC)
    • Expressions
    • Google
      • Common configuration for Google Workspace - Directory API
      • Common configuration for Google Workspace - authentication for Fortified ID products
      • Delegated administration for Google Workspace - teacher updates student guardians
      • Delegated administration for Google Workspace - teacher updates student password
      • Protect Google Workspace with eID MFA
    • HTTPS
    • Protect sensitive data, such as social security numbers, through obfuscation
    • Reverse proxy
      • Install Apache Web Server on Windows
      • Add SSL certificate and enable https
      • Add a Fortified ID virtual host
    • Set AuthnContextClassRef
    • Wiki.js - OpenID Connect (OIDC)
Powered by GitBook
On this page
  • Scenario
  • Prerequisite
  • Add ZIP content to you installation
  • Update the configuration to map your environment
  • Start Password Reset sevice
  • Test the overlay
  • Example config.json
  1. Misc
  2. Customization

Overlay - Password Reset

Change look and feel for Password Reset. Add new and/or update existing languages.

PreviousOverlay - PortalNextOverlay - Enrollment

Last updated 1 year ago

Scenario

In this use case we are going to change the look and feel for the Fortified ID application Password Reset. We will also add a language (Norwegian) and add information to the Swedish language file.

Prerequisite

There are some prerequisite for this use case.

  • Fortified ID Password Reset installed.

Add ZIP content to you installation

  1. First, make a backup of your existing customer folder.

    1. Open folder C:\Program Files\FortifiedID\pwdreset

    2. Rename customer folder to customer_ORG

  2. From the downloaded ZIP-file, add the example customer folder to: C:\Program Files\FortifiedID\pwdreset\

  3. The result should look like:

Update the configuration to map your environment

The downloaded folders contains all information needed. For example, a test certificate and files are included and configured to work with the example applications. However, some data needs to be changed to match your environment. Since this example was done on a Windows server you might need to update file paths if you run something else. Also the http ports might need to be changed if they are not available in your environment.

To make it easy to change settings to your local environment. Go to the config folder and edit the file globals.json, that contains the information you need to change. Config.json uses the variables in globals.json.

  1. Open globals.json in \..\fortifiedid\enrollment\customer\config and update:

    1. File paths if needed

    2. HTTP if needed

Start Password Reset sevice

Note. Since we use the NoOp authenticator there will be no login and use of Fortified ID Web/IdP.

  1. Start the Fortified ID Password Reset service. Verify the service is running.

Test the overlay

If you have added the folder structure and example config.json file used in this use case.

  1. Open a browser

    1. New language option (Norwegian)

      1. Verify that Norwegian exists as language option

      2. Change to Norwegian

      3. Change back to English

    2. favicon.ico is different from default

    3. Logo should be Litho Acme logo in top left corner

    4. Top bar should be Litho colors

    5. Below screenshot should be the result you should see

Example config.json

Below is an example config.json file with focus only on this use case. We use the NoOp authenticator so no need for an IdP (e.g. Fortified ID Web). This example config.json also maps to the overlay folder created for this use case.

{
    "globals": "@include:globals.json",
    "modules": [
        {
            "name": "CefEventModule",
            "config": {}
        },
        {
            "name": "HttpClient",
            "config": {
                "name": "default",
                "ssl_trust_all": true,
                "idle_timeout_ms": 5000,
                "connect_timeout_ms": 5000
            }
        },
        {
            "name": "PasswordReset",
            "config": {
                "webroot_dir": "resources/web",
                "http_port": "${globals.http.port}",
                "http_use_ssl": true,
                "http_keystore_ref": {
                    "type": "${globals.keystore.https.ref.type}",
                    "path": "${globals.keystore.https.ref.path}",
                    "password": "${globals.keystore.https.ref.password}"
                },
                "http_keystore_type": "${globals.keystore.https.type}",
                "http_key_alias": "${globals.keystore.https.http_key_alias}",
                "http_key_password": "${globals.keystore.https.http_key_password}",
                "http_context": "/pwdreset",
                "http_auth_redirect_url": "/pwdreset/authn/login",
                "overlay_dirs": [
                    "${globals.file_paths.base_dir}/config/resources_external/overlays/0_look_and_feel",
                    "${globals.file_paths.base_dir}/config/resources_external/overlays/1_pwdreset",
                    "${globals.file_paths.base_dir}/config/resources_external/overlays/"
				],
                "pipe_id": "Reset_Active_Directory_Password",
                "rules": "@include:rules.json",
                "http_csrf": {
                    "enabled": false
                }
            }
        },
        {
            "name": "AuthN",
            "config": {
                "http_context": "/authn",
                "http_port": "${globals.http.port}",
                "http_use_ssl": true,
                "http_keystore_ref": {
                    "type": "${globals.keystore.https.ref.type}",
                    "path": "${globals.keystore.https.ref.path}",
                    "password": "${globals.keystore.https.ref.password}"
                },
                "http_keystore_type": "${globals.keystore.https.type}",
                "http_key_alias": "${globals.keystore.https.http_key_alias}",
                "http_key_password": "${globals.keystore.https.http_key_password}",
                "authenticators": [
                    {
                        "id": "test_auth",
                        "type": "NoOp",
                        "config": {
                            "context_path": "/pwdreset/authn/login",
                            "success_location": "/pwdreset/",
                            "logout_location": "https://www.fortifiedid.se",
                            "properties": {
                                "display_name": "John Doe"
                            }
                        }
                    }
                ]
            }
        }
    ]
}

Download with example customer folder for Password Reset.

Browse to

ZIP-file
https://localhost:8446/pwdreset/