Table of Contents |
---|
...
Required Identity Settings
Setting | Values | Description |
---|---|---|
RequireAccountVerificationRequire Account Verification | True/False | If an account is found, if TRUE, guest will be texted or emailed a code to verify that they are allowed to claim the account, if FALSE, the guest will be able to create an authentication profile on a found account with no verification required.CheckPassMediaForFindUser. |
Require Address Verification | True/False | Customers creating an account will enter a zip code, enabling Identity to more accurately match a new account to a potential existing account. |
Check Pass Media For Find User | True/False | If TRUE, guest can login using their pass media or RFID number. If FALSE, login with pass number is disabled. If set to true, there are language strings that should be setup to reflect that this is allowed for guests as well. |
AgeLimitGTM ID | GTM- XXXX | Supply Aspenware with your GTM ID |
Age Limit | 13 is the default | Age limit for guests to create accounts |
PasswordExpiredEnabledPassword Expired Enabled | True/False | When set to TRUE this setting will enforce a password reset for all users logging in through identity with an RTP password date change of today (automatically set in Azure) minus the “PasswordChangeDays” set below. If FALSE, guests will never be forced to reset their password. |
PasswordChangeDaysPassword Change Days | 750 is the default | Only needed if PasswordExpiredEnabled is True. This setting subtracts the number of days from today’s date to determine how recently users must have changed their password in order not to force a reset. For example, if set to 7, any user who has created their account or reset their password in the past week will not be sent down the password reset flow. |
Password Lockout Enabled | True/False | When set to TRUE this setting will enforce password lockout. |
Failed Password Lockout Duration (Minutes | # of MInutes | The number of minutes that the guest will be locked out after triggering the password lockout. |
Failed Password Lockout Attempts | # | The number of attempts a guest is allowed to enter an incorrect password before being locked out. |
Optional Identity Settings
...
Note |
---|
IMPORTANT: At this time fonts are not customizable for those who use Javascript to import their custom fonts. When custom fonts are not available, Identity will use Helvetica and Arial if the browser doesn’t support Helvetica. Also, note that only a single font is supported for Identity, so using different font libraries for headers and body copy is not currently supported. |
...
Find and install the Identity Plugin
In the Aspenware Commerce admin panel go to Configuration > Local Plugins
Search the list for ExternalAuth Methods : Identity Authentication
Select Install.
Once installation is complete, select Restart application to apply changes at the top of the page.
Info |
---|
NOTE: This restart can take up to 7 minutes to complete and should occur during low-traffic times. |
Configure Identity External Authentication
Go to Configuration > External Authentication
If the Identity plugin has been successfully installed you will see it on the admin screen.
Select Configure.
Enter your OpenID, ClientID, and OpenID ClientSecret (these are created and provided by Aspenware).
In the Authority to use when connecting to OpenID field enter the web address (URL) that will be using Identity.
Select Save.
Return to the External Authentication Admin page and select Edit.
Select the check box under the Is active column then select Update.
Insert excerpt | ||||||
---|---|---|---|---|---|---|
|
...