Use Cases
HomeIntegrityControlManagement CenterSolutions
  • Get Started
  • Integrity | Access
    • Auth. methods
      • LDAP (Username/Password)
      • LDAP (Username/Password) + OTP (SMTP)
      • LDAP (Username/Password) + OTP (SMS)
      • Swedish BankID
      • Microsoft Entra ID (SAMLSPBroker)
      • Foregin eID (SAMLSPBroker)
    • Auth. methods (SAML)
      • One-Time Password (OATH)
      • Inera IdP (SITHS) (SAMLSPBroker)
      • ID-porten (Norway) (SAML IdP with OIDC RP)
      • Multiple SAML IdP's configured
        • Multiple JSON files
    • Auth. methods (OIDC)
      • Static values (OIDC) - Test only
      • Swedish BankID (OIDC)
      • UID/PWD (OIDC)
    • Auth. methods (MISC)
      • Selector filtering
      • AuthZ control
      • External links and Cancel location
    • Add a Federation or SAML SP
  • Integrity | Portal
    • Portal
  • Integrity | Enrollment
    • Software token (OATH)
    • Best practice configuration
  • Integrity | Radius
    • UID/OATH token
    • UID/Password/OATH token
    • UID/Password/SMTP
  • Integrity | API
    • Swedish Siths eID
    • Oath Token
  • Control | Applications
    • Password Reset
    • Password Reset for Entra ID
    • Password Reset for Google Workspace
  • OPERATION
    • Rolling upgrade - cluster
  • TROUBLESHOOTING
    • Wrong relaystate
  • Misc
    • Address configuration externally
    • ADFS
      • Protect Fortified ID apps
      • Install and configure Fortified ID ADFS adapter for Siths eID
      • Install and configure Fortified ID ADFS adapter for Oath
    • AWS
      • Protect AWS Cognito with eID MFA
      • Protect AWS IAM Identity Center with eID MFA
    • Customization
      • Overlay - WEB
      • Overlay - Portal
      • Overlay - Password Reset
      • Overlay - Enrollment
      • Logout page
    • Dependency-Track - protect with eID MFA and SSO
    • Digitala Nationella Prov (DNP) / Skolfederation
      • Active Directory Federation Services (ADFS) with BankID as step-up-method
      • Active Directory / LDAP with BankID as step-up-method
      • Entra ID (Azure AD) with BankID as step-up-method
      • Google with BankID as step-up-method
      • Generate eduPersonPrincipalName (eppn) and store in Google
      • Generate eduPersonPrincipalName (eppn) and store in Entra ID
      • Common configuration
    • Encrypt configuration secrets
    • Microsoft Entra
      • Protect Entra ID (Azure AD) with eID MFA
      • Entra External - Support for eID (SAML)
      • Entra External - Support for eID (OIDC)
    • Expressions
    • Google
      • Common configuration for Google Workspace - Directory API
      • Common configuration for Google Workspace - authentication for Fortified ID products
      • Delegated administration for Google Workspace - teacher updates student guardians
      • Delegated administration for Google Workspace - teacher updates student password
      • Protect Google Workspace with eID MFA
    • HTTPS
    • Protect sensitive data, such as social security numbers, through obfuscation
    • Reverse proxy
      • Install Apache Web Server on Windows
      • Add SSL certificate and enable https
      • Add a Fortified ID virtual host
    • Set AuthnContextClassRef
    • Wiki.js - OpenID Connect (OIDC)
Powered by GitBook
On this page
  • Scenario
  • Prerequisite
  • Add ZIP content to you installation
  • Start Portal sevice
  • Test the overlay
  • Example config.json
  1. Misc
  2. Customization

Overlay - Portal

Change look and feel for Portal. Add new and/or update existing languages.

PreviousOverlay - WEBNextOverlay - Password Reset

Last updated 1 year ago

Scenario

In this use case we are going to change the look and feel for the Fortified ID application Portal. We will also add a language (Norwegian) and add information to the Swedish language file.

Prerequisite

There are some prerequisite for this use case.

  • Current version of Fortified ID Portal installed.

Add ZIP content to you installation

  1. First, make a backup of your existing customer folder.

    1. Open folder C:\Program Files\FortifiedID\portal

    2. Rename customer folder to customer_ORG

  2. From the downloaded ZIP-file, add the example customer folder to: C:\Program Files\FortifiedID\portal\

  3. The result should look like:

Folder contents:

0_look_and_feel, contains assets for logo, favorite icon and css. The file ui_config_overrides.json contain all settings.

1_portal, contains custom locals

images, contains application images

Start Portal sevice

Note. Since we use the NoOp authenticator there will be no login and use of Fortified ID Web/IdP.

  1. Start the Fortified ID Portal service. Verify the service is running.

Test the overlay

If you have added the folder structure and example config.json file used in this use case.

  1. Open a browser

  2. Browse to http:/localhost:8090/portal

    1. New language option (Norwegian)

      1. Verify that Norwegian exists as language option

      2. Change to Norwegian

      3. Change back to English

    2. favicon.ico is different from default

    3. Logo should be Litho Acme logo in top left corner

    4. Top bar should be Litho colors

    5. Below screenshot should be the result you should see

Example config.json

Below is an example config.json file with focus only on this use case. We use the NoOp authenticator so no need for an IdP (e.g. Fortified ID Web). This example config.json also maps to the overlay folder created for this use case.

{
    "globals": "@include:globals.json",
    "modules": [
        {
            "name": "CefEventModule",
            "config": {}
        },
        {
            "name": "HttpClient",
            "config": {
                "name": "default",
                "ssl_trust_all": true,
                "idle_timeout_ms": 5000,
                "connect_timeout_ms": 5000
            }
        },
        {
            "name": "Portal",
            "config": {
                "webroot_dir": "resources/web",
                "http_port": "${globals.http.port}",
                "http_use_ssl": true,
                "http_keystore_ref": {
                    "type": "${globals.keystore.https.ref.type}",
                    "path": "${globals.keystore.https.ref.path}",
                    "password": "${globals.keystore.https.ref.password}"
                },
                "http_keystore_type": "${globals.keystore.https.type}",
                "http_key_alias": "${globals.keystore.https.http_key_alias}",
                "http_key_password": "${globals.keystore.https.http_key_password}",
                "http_context": "/portal",
                "http_auth_redirect_url": "/portal/authn/login",
                "overlay_dirs": [
                    "${globals.file_paths.base_dir}/config/resources_external/overlays/0_look_and_feel",
                    "${globals.file_paths.base_dir}/config/resources_external/overlays/1_portal",
                    "${globals.file_paths.base_dir}/config/resources_external/overlays/"
                ],
                "applications": "@include:resources_internal/applications"
            }
        },
        {
            "name": "AuthN",
            "config": {
                "http_context": "/authn",
                "http_port": "${globals.http.port}",
                "http_use_ssl": true,
                "http_keystore_ref": {
                    "type": "${globals.keystore.https.ref.type}",
                    "path": "${globals.keystore.https.ref.path}",
                    "password": "${globals.keystore.https.ref.password}"
                },
                "http_keystore_type": "${globals.keystore.https.type}",
                "http_key_alias": "${globals.keystore.https.http_key_alias}",
                "http_key_password": "${globals.keystore.https.http_key_password}",
                "authenticators": [
                    {
                        "id": "test_auth",
                        "type": "NoOp",
                        "config": {
                            "context_path": "/portal/authn/login",
                            "success_location": "/portal/",
                            "logout_location": "https://www.fortifiedid.se",
                            "properties": {
                                "display_name": "John Doe"
                            }
                        }
                    }
                ]
            }
        }
    ]
}

Download with example customer folder for Portal.

ZIP-file
Portal overlay structure