Latest update: 7.0.4
- Overview
- About User Self-Service
- Self-Registration
- Social Registration
- OpenID Connect Authorization Code Flow
- Many Social Identity Providers, One Schema
- Setting Up Google as a Social Identity Provider
- Setting Up LinkedIn as a Social Identity Provider
- Setting Up Facebook as a Social Identity Provider
- Setting Up Amazon as an IDM Social Identity Provider
- Setting Up Microsoft as an IDM Social Identity Provider
- Set Up Apple as an IDM Social Identity Provider
- Setting Up WordPress as an IDM Social Identity Provider
- Setting Up WeChat as an IDM Social Identity Provider
- Setting Up Instagram as an IDM Social Identity Provider
- Setting Up Vkontakte as an IDM Social Identity Provider
- Setting Up Salesforce as an IDM Social Identity Provider
- Setting Up Yahoo as an IDM Social Identity Provider
- Setting Up Twitter as an IDM Social Identity Provider
- Setting Up a Custom Social Identity Provider
- Configuring the Social Providers Authentication Module
- Account Claiming: Links Between Accounts and Social Identity Providers
- Managing Social Identity Providers Over REST
- Testing Social Identity Providers
- Scenarios When Registering With a Social ID
- Social Identity Widgets
- Progressive Profile
- Password Reset
- Username Retrieval
- Additional Configuration
- Configure Notification Emails
- Configure Privacy and Consent
- Configure UMA, Trusted Devices, and Privacy
- Terms & Conditions
- Tokens and User Self-Service
- End User UI Notifications
- Configure Google reCAPTCHA
- Configure Identity Fields
- Configure Security Questions
- Add Custom Policies for Self-Registration and Password Reset
- Self-Service End User UI
- Custom Self-Service Stages
- Self-Service Stage Reference
- All-In-One Registration
- OpenAM Auto-Login Stage
- Attribute Collection Stage
- Captcha Stage
- Conditional User Stage
- Consent Stage
- Email Validation Stage
- IDM User Details Stage
- KBA Security Answer Definition Stage
- KBA Security Answer Verification Stage
- KBA Update Stage
- Local Auto-Login Stage
- Parameters Stage
- Patch Object Stage
- Password Reset Stage
- Self-Registration Stage
- Social User Claim Stage
- Terms and Conditions Stage
- User Query Stage
- Social Identity Provider Reference
- Google Social Identity Provider Configuration Details
- LinkedIn Social Identity Provider Configuration Details
- Facebook Social Identity Provider Configuration Details
- Amazon Social Identity Provider Configuration Details
- Microsoft Social Identity Provider Configuration Details
- WordPress Social Identity Provider Configuration Details
- WeChat Social Identity Provider Configuration Details
- Instagram Social Identity Provider Configuration Details
- Vkontakte Social Identity Provider Configuration Details
- Salesforce Social Identity Provider Configuration Details
- Yahoo Social Identity Provider Configuration Details
- Twitter Social Identity Provider Configuration Details
- Custom Social Identity Provider Configuration Details
- Social Identity Provider Button and Badge Properties
- IDM Glossary
Managing Social Identity Providers Over REST
You can identify the current status of configured social identity providers with the following REST call:
The output that you see includes JSON information from each configured social identity provider, as described in the
identityProvider-provider
file in your project'sconf/
subdirectory.One key line from this output specifies whether the social identity provider is enabled:
If the
SOCIAL_PROVIDERS
authentication module is disabled, you'll see the following output from that REST call:For more information, see "Configuring the Social Providers Authentication Module".
If the
SOCIAL_PROVIDERS
module is disabled, you can still review the standard configuration of each social provider (enabled or not) by running the same REST call on a different endpoint (do not forget thes
at the end ofidentityProviders
):Note
If you have not configured a social identity provider, you'll see the following output from the REST call on the
openidm/identityProviders
endpoint:You can still get information about the available configuration for social identity providers on a slightly different endpoint:
The
config
in the endpoint refers to the configuration, starting with theidentityProviders.json
configuration file. Note how it matches the corresponding term in the endpoint.You can review information for a specific provider by including the name with the endpoint. For example, if you've configured LinkedIn as described in "Setting Up LinkedIn as a Social Identity Provider", run the following command:
The above command differs in subtle ways. The
config
in the endpoint points to configuration data. TheidentityProvider
at the end of the endpoint is singular, which matches the corresponding configuration file,identityProvider-linkedIn.json
. AndlinkedIn
includes a capitalI
in the middle of the word.In a similar fashion, you can delete a specific provider:
If you have the information needed to set up a provider, such as the output from the previous two REST calls, you can use the following command to add a provider:
IDM incorporates the given information in a file named for the provider, in this case,
identityProvider-linkedIn.json
.You can even disable a social identity provider with a
PATCH
REST call, as shown:You can reverse the process by substituting
true
forfalse
in the previousPATCH
REST call.You can manage the social identity providers associated with individual users over REST, as described in "Managing Social Identity Providers Over REST".