Skip to content

Adaptive authentication scenarios - Overview

See the topics given below to learn about the adaptive authentication scenarios supported in MWARE IAM and to try them out.

Adaptive authentication scenarios

Set up the samples

To try out the adaptive authentication scenarios listed above, let's set up the sample applications.

Set up the sample

This section guides you on how to set up the sample SAML application.


  • Download Apache Tomcat 8.x and install it. Tomcat server installation location will later be referred to as <TOMCAT_HOME> in this guide.

  • It is recommended that you use a hostname that is not localhost to avoid browser errors. Modify your machine's /etc/hosts entry to reflect this.


    Note that wso2is.local is used in this documentation as an example, but you must modify this when configuring the authenticators or connectors with this sample application.

  • Download the SAML pickup dispatch application from the latest release assets.

Deploy the sample web app

To deploy the sample web app on a web container:

  1. Copy the downloaded .war file of the SAML application into the webapps directory of the Tomcat folder.

  2. Start the Tomcat server.

Add CORS configuration

SAML2 POST Binding requires CORS configurations to be set up.

Before configuring the service provider, add the following configurations to the deployment.toml file found in <IS_HOME>/repository/conf/. Adding this configuration allows HTTP POST requests.

``` toml
allow_generic_http_requests = true
allow_any_origin = false
allowed_origins = [
allow_subdomains = false
supported_methods = [
support_any_header = true
supported_headers = []
exposed_headers = []
supports_credentials = true
max_age = 3600
tag_requests = false

Register a service provider

  1. On the Management Console, go to Main > Identity > Service Providers and click Add.

  2. Enter saml2-web-app-pickup-dispatch as the Service Provider Name, and click Register.

  3. Expand the Inbound Authentication Configuration > SAML2 Web SSO Configuration section and, click Configure.

  4. Enter the following values in the fields mentioned.

    Field name Value
    Assertion Consumer URL


    Click Yes on the dialog that appears after you add the Assertion Consumer URL. This dialog appears when you add an http URL.

  5. Enable the following by selecting the corresponding checkboxes:

    • Enable Response Signing
    • Enable Signature Validation in Authentication Requests and Logout Requests
    • Enable Single Logout
    • Enable Attribute Profile
      • Include Attributes in the Response Always


    For more information on the advanced configurations, see Advanced SAML Configurations.

  6. Click Register to add the service provider and save the configurations.