How to

How to manage Refresh token on Safewhere*Identify

Introduction Since version 2.0, introduces Refresh token on top of its popular Access token. An access token contains information about the scopes or roles of a user to a certain service. Originally, issuing an access token means the issuer relinquishes […]

Access to Identify’s endpoint

From version 4.3, user can go to: https://tenantdomain/runtime/ to see the endpoint of . Or login to the Admin, access to help page:

WHR: redirect the connection to ADFS

http://wiki.rangstrup.com/doku.php?do=login&sectok=d7df910921b9073a18a0da8a98546a45&id=whr_parameter As the habit, client’s used to applying whr to redirect to the connection on like this: However, the whr usage is applied by the following rules: uuid: contains the value of the preferred connection. Example: whr=uuid:6D37275A-CDD3-4D20-BB39-D595D9D540AA EntityIdentifier: only available […]

Which comparison do we use for EntityID for connection?

Question: on WS-Trust connection, we use the “Like” comparison as the default comparison to get the EntityID. However, in some circumstance, we get the following case, e.g the coming URL: https://ec2-79-125-16-126.eu-west-1.compute.amazonaws.com/miljoeportal.geodata.1.0.0/DmpConflictService.svc Which is matched on both connections: Arealinfo Conflict Amazone: […]

How to make a scripted claim that base64 encoded?

Try with this below sample on Script claim transformation where “dk:gov:saml:attribute/RidNumberIdentifier” is base64 encoded and then replace the non-encoded value.

 

How to check the claim type following the token type?

  your token request type is urn:oasis:names:tc:SAML:1.0:assertion, so your claim type must be in format: ID4216: The ClaimType ‘dk:gov:saml:attribute:UniqueAccountKey’ must be of format ‘namespace’/’name’. Parameter name: claimType And on the event 500 on the above screenshot, we have some claims […]

How to fix common MSDTC issues

On Identify server, we need to update it: Ensure that the MSDTC  is ready by opening  Component Services, choose Properties on Local DTC (it is placed under Component Services|Computers|MyComputer|Distributed Transaction Coordinator) and enter the Security tab and make sure things […]

How to setup LDAP login provider for Identify

 setup  On AD server, install the configurator. We will create the where its general info likes this: On its setup, we update its info like below: On its certificate setup, we choose the 2 certificates: The certificate: “ server certificate” […]

How to solve “The underlying provider failed on Open” exception

Question: We have installed a new instance of identify and we are getting the following exception when we try to add a new connection:   The underlying provider failed on Open. at System.Data.EntityClient.EntityConnection.OpenStoreConnectionIf(Boolean openCondition, DbConnection storeConnectionToOpen, DbConnection originalConnection, String exceptionCode, […]

Token type SAML 1.1 vs Token type SAML 2.0

Question: This client has started calling Identify in the new test environment for (BTS/.Net) and using existing act-as functionality. They get 2.0 tokens returned but think that their existing act-as code cannot handle it, since they get some new errors […]