Starting with version 8.4, Airlock IAM supports Config Snippets. Learn how they make integration of new functionality, such as identity proofing, much easier.

 

A few months ago, we published an introduction to Identity Proofing and how it can be easily done with Airlock IAM.

The blog post was accompanied by a GitHub repository containing a full IAM configuration. Simply download, import and activate. However, there are some disadvantages:

  • A complete configuration not only specifies identity proofing but also the database, the login flow and other self-services.
  • Integration of the identity proofing functionality into an existing project can be done but it requires extensive manual work.

In the meantime, we updated the repository to include a Config Snippet as it is supported by Airlock IAM 8.4.

Config Snippets are a feature of the new IAM Config Model which introduces a new file format (YAML) and allow config automation. Please check the product documentation for detailed information about these new possibilities. In addition, we will soon show in another blog post how specific challenges can be addressed. Stay tuned.

Import IAM Snippet

For the moment, let’s continue with the instructions on how to work with the Config Snippet, to add identity proofing to your existing configuration:

1. Clone repository airlock-iam-examples

2. Copy Config Snippet 'registration-with-identity-proofing.yaml' from directory 'identity-proofing-with-airlock-iam/snippet'.

3. Use Drag & Drop to import the Snippet in IAM Config Editor into the plugin tree (left).

4. Answer the followup question:

Link plugins

The Identity Proofing functionality is now part of your configuration but is not yet integrated into the flows. Follow theses steps to do this:

1. The new plugins are not yet linked into your plugin tree and listed under "unconnected plugins".

2. In Loginapp, add the new self registration flow as Default or other flow.

3. The new self registration process adds values to specific user context data fields. Usually, these fields are already defined in an existing configuration and have to be referenced.

Email address:

First and last name (only showing first name, here):

Nr of identity document:

This context data field needs somewhat special handling as it usually does not yet exist. Consequently, it has to be created (not showing the details as they are not different from any other context data field).

By using these few simple steps, identity proofing has been added to the existing configuration which can now be activated.

Information for you

-Our whitepapers-

White paper: The puzzle pieces of modern authentication

Identity management is like a puzzle: you have to understand the big picture, identify the relevant pieces and put them together in the right order. This white paper shows how to do that.

 

Request white paper

Whitepaper: How to make cIAM a success

Increasing requirements for security and user-friendliness make Customer Identity and Access Management an essential. Read our whitepaper to find out how you can secure your competitive advantage with the right CIAM strategy.

 

Request whitepaper

Whitepaper: Security for cloud-native applications

You can read about how companies can ensure the security of web applications and APIs in Kubernetes in the white paper "Security for cloud-native applications", which was created in collaboration between heise and Airlock.

 

Request whitepaper

Whitepaper: Zero Trust is a journey

The ongoing digital transformation of the world is progressing and having a profound impact on our personal and professional lives in ways that were difficult to imagine just a few years ago.


This white paper discusses the effects of continuous digitalization and its impact.

Request free of charge

Off to DevSecOps

In this white paper, you will learn the most important insights into how you can implement DevSecOps successfully and efficiently, which security components are required for this and the advantages of a microgateway architecture.

 

Request free of charge

Airlock 2FA - Strong authentication. Simple.

Double security - this is what two-factor authentication offers in the field of IT security.


Find out more about strong authentication and the possibilities offered by Airlock in our white paper.

Download for free

Further whitepapers

We provide you with free white papers on these and other topics:

 

  • Successful IAM projects
  • compliance
  • Data protection (DSGVO)
  • Introduction of PSD2
  • PCI DSS requirementsPCI DSS requirements
Request free of charge