You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2. Create [custom attributes](https://wso2.com/asgardeo/docs/guides/users/attributes/manage-attributes/) named `accountType` and `businessName`. Add the accountType and country attributes to the profile scope.
6
+
2. Create [custom attributes](https://wso2.com/asgardeo/docs/guides/users/attributes/manage-attributes/) named `accountType` and `businessName`. Add the businessName, accountType and country attributes to the profile scope.
7
7
3. Create another [custom attribute](https://wso2.com/asgardeo/docs/guides/users/attributes/manage-attributes/) with the name `isFirstLogin`.
8
8
4. Enable the [Attribute Update Verification](https://wso2.com/asgardeo/docs/guides/users/attributes/user-attribute-change-verification/) for user email.
9
9
5. Create a SPA application.
10
-
* Enable the `Code` and `Refresh Grant` types
10
+
* Navigate to the "Shared Access" tab and share the application with all organizations.
11
+
* Enable the `Code`, `Refresh Grant` and `Organization Switch` types.
12
+
* Note that the organization switch grant type is available only after shared access is enabled.
11
13
* Add authorize redirect URL: `http://localhost:5173` and allowed origin: `http://localhost:5173`
12
-
* Add the `country` and `accountType` to Profile scope navigating to `User Attributes & Stores` -> `Attributes` -> `OpenId Connect` -> `Scopes` -> `Profile` -> `New Attribute`.
14
+
* Add the `mobile`, `country`, `email` and `accountType` to Profile scope navigating to `User Attributes & Stores` -> `Attributes` -> `OpenId Connect` -> `Scopes` -> `Profile` -> `New Attribute`.
13
15
* Enable the following scopes and attributes within the client application created.
14
-
*`Profile - Country, First Name, Last Name, Username, Birth Date, AccountType; Email - email; Phone - telephone; Address - country.`
16
+
*`Profile - Country, First Name, Last Name, Username, Birth Date, AccountType, Business Name, Email; Email - email; Phone - telephone; Address - country.`
15
17
6. Enable the following authenticators within the client application:
16
18
*`Identifier First` - First Step
17
19
*`Username and Password`, `Passkey` - Second Step
18
20
*`Totp` and `Email OTP` - Third Step
19
-
7. Configure the following conditional authentication script (Replace the `<NODE_SERVER_BASE_PATH>` with server URL):
20
-
```js
21
-
var moneyTransferThres =10000;
22
-
var riskEndpoint ="<NODE_SERVER_BASE_PATH>/risk"
23
-
24
-
varonLoginRequest=function(context) {
25
-
26
-
var isMoneyTransfer =context.request.params.action&&context.request.params.action[0] ==="money-transfer";
7. Configure the conditional authentication script (Replace the `<NODE_SERVER_BASE_PATH>` with server URL) with the one found at conditional-auth-script.js.
176
22
8. Create a standard web application.
177
23
9. Navigate to the "Shared Access" tab and share the application with all organizations.
13. Navigate to the Roles tab and create an application role named `Business Administrator` with the permissions for the SCIM2 Users and SCIM2 Roles organization APIs.
54
+
13. Navigate to the Roles tab and create an application role named `Business Administrator` with the permissions for the SCIM2 Users and SCIM2 Roles organization APIs. Also, create roles `Manager`, `Auditor` and `Member`.
205
55
14. Navigate to Connections -> Passkey Setup -> Add the Trusted Origins: `http://localhost:5173` and enable `Allow Passkey usernameless authentication` option.
206
56
207
57
15. Configure [Onfido identity verification](https://wso2.com/asgardeo/docs/guides/identity-verification/add-identity-verification-with-onfido/) for your organization.
0 commit comments