You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: en/includes/guides/users/attributes/manage-attributes.md
+32-11Lines changed: 32 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -224,23 +224,23 @@ To delete an attribute:
224
224
Only custom attributes can be deleted.
225
225
226
226
{% if product_name == "WSO2 Identity Server" %}
227
-
## Manage Identity Attributes
227
+
## Manage identity attributes
228
228
229
229
By default, identity claim values are stored in the JDBC datasource configured in the `deployment.toml` file. If required, you can configure WSO2 Identity Server to store the claim values in another user store as well.
230
230
231
-
1. Open the `<IS_HOME>/repository/conf/deployment.toml` file and add the following configuration to change the `identity_datastore` property value to `IdentityDataStoreService`. This service, functioning as an OSGi service, is dedicated to accessing Identity data stores.
231
+
1. Open the `<IS_HOME>/repository/conf/deployment.toml` file and add the following configuration to change the `identity_datastore.datastore_type` property. The `IdentityDataStoreService` OSGi service uses this value to determine which data store implementation to access.
232
232
233
-
```
234
-
[identity_datastore]
235
-
datastore_type = "<Name of the identityDataStore class>"
236
-
```
233
+
```
234
+
[identity_datastore]
235
+
datastore_type = "<Name of the identityDataStore class>"
236
+
```
237
237
238
-
!!! Note
239
-
The class name configuration for the identity data store has been separated from the listener configurations. If you're using a custom data store class, it's crucial to update your `deployment.toml` file to reflect this choice. This update ensures that your custom class will override the default configuration.
238
+
!!! Note
239
+
The class name configuration for the identity data store is now separate from the listener configurations. If you're using a custom data store class, it's crucial to update your `deployment.toml` file to reflect this choice. This update ensures that your custom class will override the default configuration.
240
240
241
-
To either maintain the previous behavior or use your custom data store, simply follow these steps and update your deployment.toml:
241
+
To either maintain the previous behavior or use your custom data store, simply follow these steps and update your deployment.toml:
242
242
243
-
By making this configuration adjustment, you can ensure that your system aligns with your preferred data store class, whether it's the previous default or a custom class you've implemented. This helps you tailor the system to your specific needs.
243
+
By making this configuration adjustment, you can ensure that your system aligns with your preferred data store class, whether it's the previous default or a custom class you've implemented. This helps you tailor the system to your specific needs.
244
244
245
245
2. Map the identity claims mentioned below to attributes in the underlying user store.
246
246
@@ -256,7 +256,28 @@ datastore_type = "<Name of the identityDataStore class>"
256
256
257
257
- `http://wso2.org/claims/identity/failedLoginAttempts`: This is
258
258
used to track the number of consecutive failed login attempts.
259
-
It is based on this that the account is locked.
259
+
It's based on this that the account is locked.
260
+
{% endif %}
261
+
262
+
{% if product_name == "WSO2 Identity Server" and is_version > "7.1.0" %}
263
+
264
+
WSO2 Identity Server includes hidden identity attributes that support internal functionality but don't appear in the Console UI by default. These attributes typically don't require mapping with Service Providers (SPs) or Identity Providers (IdPs).
265
+
266
+
You can customize the set of hidden identity attributes by adding the following configuration to the `<IS_HOME>/repository/conf/deployment.toml` file:
267
+
268
+
```
269
+
[identity_mgt.claims]
270
+
hidden_claims = [
271
+
"<attribute_uri_1>",
272
+
"<attribute_uri_2>",
273
+
...
274
+
]
275
+
```
276
+
277
+
To add new attributes to the hidden list, include their URIs in the hidden_claims array.
278
+
279
+
To unhide default hidden attributes, override the configuration with an empty list or remove the relevant URIs.
0 commit comments