Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Published by Scroll Versions from space IDS and version 8.2

Ubisecure CustomerID supports storing basic user information to predefined repository objects. Also custom information can be stored to the main user authentication data repository by creating a mapping between the Ubisecure CustomerID internal field name and the repository attribute name. (See eidm2.properties data.attribute.mapping)

Ubisecure CustomerID internal user information fields are:
firstname, surname, email, mobile, login, locale, password, customerid, companyid, acceptTerms

Mapping of basic internal fields to repository attributes goes as follows:
firstname = givenName
surname = sn
email = mail
mobile = mobile
login = uid (configurable with general.login.attribute)
locale = By default not mapped. Can be mapped using data.attribute.mapping.
password = UbiloginAuthMethod-object

Mapping of extra fields to repository:
ssn = description (configurable with data.attribute.mapping)
customerid = Virtual organization structure (depending on configuration)
companyid = Virtual organization structure (depending on configuration)

Mapping of custom fields to repository attributes is configured with data.attribute.mapping –properties.

Ubisecure CustomerID supports custom attributes for users and organizations. For users custom attributes will be stored in the database. They may be additionally stored also in the main user authentication data repository. For organizations custom attributes will only be stored in the database. Maximum length for a custom attribute value is 255 characters.

Note

NOTE: Only lower case alphanumeric characters are allowed when naming custom attributes.

Storing user custom attributes in the main user authentication data repository is defined using the data.attribute.mapping.<attribute name> property as defined below in Data Storing Properties chapter. All user custom attributes will be automatically stored to the database as strings. Defining if the user attributes should be encrypted is done using the data.attribute.encrypt property as defined below in Data Storing Properties chapter.

All organization custom attributes will be automatically stored to the database as strings.

Ubisecure CustomerID does not provide default language text keys for custom attributes because we don't know the names of the custom attributes beforehand. Therefore always when new custom attributes are defined also the language files need to be updated. At least the following new language keys may be required for each new user custom attribute:

Code Block
languagetext
admin.approval.user.<custom user attribute name>.tooltip
admin.roleinvitation.user.<custom user attribute name>.tooltip
registerWizard.<custom user attribute name>
registration.<registration name>.input.user.<custom user attribute name>.tooltip
tooltip.user.attribute.modification.<custom user attribute name>
user.<custom user attribute name>

The display text for each new organization attribute must also be added to the messages_XX.properties file. At least the following new language keys may be required for each new organization custom attribute:

Code Block
languagetext
titlecustomerid/custom/messages_XX.properties
registerWizard.organization.<custom organization attribute name> = <custom organization attribute text shown before field during registration>
organization.<custom organization attribute name> = <custom organization attribute text shown before field>

An example of localization for the custom attribute "sic".

Code Block
languagetext
titlecustomerid/custom/messages_en.properties
# shown during registration
registerWizard.organization.sic = SIC Code 
# shown on organization details page
organization.sic = Industry Classification Code

Organization custom attributes that have not been set for organizations will not be returned in API responses.

There are some reserved names that cannot be used for custom attribute names. They are:
acceptterms, cn, companyid, create, customerid, disable, email, enable, firstname, friendlyname, hetu, locale, login, mandates.remove, mobile, organizationclass, organizationid, organizationtype, otp, otp.activated, otp.state, parentorganizationid, password, pwd, pwd.activated, registration, repouser, responseidformat, roleid, roles.remove, sms, sms.activated, ssn, status, surname, technicalname, uid, userid, username and virtual.

These configurations are available in the eidm2.properties file.

Table of Contents
printablefalse

data.attribute.encrypt

This is a comma separated list of custom attributes that should be encrypted to all data storage facilities, i.e. internal database, Ubisecure Directory and Active Directory. This cannot be enabled for certain attributes, such as cn, mobile or email.

Attributes that are encrypted cannot be used for Directory User Mapping. Attributes that are encrypted can only be found in searches by the exact value (not for example by just a prefix).

Default is <none set>.
Example:

Code Block
languagetext
data.attribute.encrypt = ssn

data.attribute.mapping.<fieldname>

These properties define the mapping between user interface field names and repository attribute names. Some fields have fixed attributes where they are stored to (see previous chapter) and these properties define the attributes where other fields are stored to.
Default is data.attribute.mapping.ssn = description
Example: 

Code Block
languagetext
data.attribute.mapping.ssn = description
Note

NOTE: There is no need to define mapping for built-in attributes firstname, surname, email, mobile and login.

data.attribute.country

This property lists attributes that store country values. The values are stored as two-character codes, but all user interfaces for the attribute modification show a country selector user interface element. See  Customization - CustomerID page on how to configure the country selector options.
Default is <not set>.
Example:

Code Block
languagetext
data.attribute.country = country