Skip to content

[IS 7.1/next] Add deployment.toml configuration for custom local authenticator visibility in the Console UI#5915

Merged
JayaShakthi97 merged 6 commits intowso2:masterfrom
JayaShakthi97:custom-authenticator
Mar 10, 2026
Merged

[IS 7.1/next] Add deployment.toml configuration for custom local authenticator visibility in the Console UI#5915
JayaShakthi97 merged 6 commits intowso2:masterfrom
JayaShakthi97:custom-authenticator

Conversation

@JayaShakthi97
Copy link
Copy Markdown
Contributor

@JayaShakthi97 JayaShakthi97 commented Feb 24, 2026

Purpose

This pull request adds documentation to clarify the proper configuration of a custom local authenticator as a first-factor authentication option in the Console UI for versions 7.1.0 and next.

image

Related issue

Summary by CodeRabbit

  • Documentation
    • Updated documentation to version-gate the deployment configuration snippet for the custom local authenticator. The configuration example is now shown only for versions "7.1.0" and "next", clarifying which releases include the console login flow entry.

@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai Bot commented Feb 24, 2026

Walkthrough

Adds version gating around a deployment.toml snippet in the "Deploy the authenticator" docs: the console.ui.login_flow_custom_first_factor_authenticators entry is included only when is_version is "7.1.0" or "next", replacing an unconditional snippet.

Changes

Cohort / File(s) Summary
Documentation: Custom Local Authenticator Configuration
en/includes/references/extend/authentication/write-a-custom-local-authenticator.md
Wrapped the deployment.toml snippet that adds console.ui.login_flow_custom_first_factor_authenticators in a version gate ({% if is_version == "7.1.0" or is_version == "next" %} ... {% endif %}), making the addition conditional (+9/-1).

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~10 minutes

Poem

🐰 A tiny patch hopped through the trees,
Guarded by versions, snug as you please,
Snippets tucked in, only when right,
Docs feel cozier, morning to night,
Hooray — the rabbit nibbles code with delight!

🚥 Pre-merge checks | ✅ 2 | ❌ 1

❌ Failed checks (1 inconclusive)

Check name Status Explanation Resolution
Description check ❓ Inconclusive The pull request description includes a clear Purpose section with related issue link and screenshot, but lacks required sections: Test environment, Security checks, and Related PRs from the template. Add the missing template sections: Test environment (specify versions/environments tested), Security checks (complete the security checklist), and Related PRs (if any exist).
✅ Passed checks (2 passed)
Check name Status Explanation
Title check ✅ Passed The title clearly and specifically describes the main change: adding deployment.toml configuration for custom local authenticator visibility in versions 7.1.0 and next, which directly aligns with the documented changes.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧹 Nitpick comments (2)
en/includes/references/extend/authentication/write-a-custom-local-authenticator.md (2)

74-74: Use “sign-in” and address the reader directly.
The sentence uses “login” for a user-facing UI and does not address the reader as “you.” Consider a shorter, active-voice rewrite.

✏️ Suggested edit
-4. To ensure the custom local authenticator is properly recognized as a first-factor option in the {{ product_name }} Console's application login flow UI, add the following configuration to the `deployment.toml` file in the `<IS_HOME>/repository/conf` folder.
+4. To make the custom local authenticator appear as a first-factor option in the {{ product_name }} Console application sign-in flow, add the following configuration to `deployment.toml` in `<IS_HOME>/repository/conf`.

As per coding guidelines: “Use 'sign-in' ... for end-user UI text,” “Address the reader as 'you',” and “Use active voice and present tense.”

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/includes/references/extend/authentication/write-a-custom-local-authenticator.md`
at line 74, Rewrite the sentence that currently reads "To ensure the custom
local authenticator is properly recognized as a first-factor option in the {{
product_name }} Console's application login flow UI, add the following
configuration to the `deployment.toml` file in the `<IS_HOME>/repository/conf`
folder." to use "sign-in", address the reader as "you", and use active
present-tense voice; for example, instruct the reader directly to "Add the
following configuration to the `deployment.toml` file in the
`<IS_HOME>/repository/conf` folder so your custom local authenticator appears as
a first-factor option in the {{ product_name }} Console's application sign-in
flow." Ensure you update the sentence containing "application login flow UI"
(search for "application login flow UI" or the deployment.toml mention) and keep
variable placeholders like {{ product_name }} unchanged.

74-79: Add required configuration details (controls, default, constraints, and when to change).
This block introduces a new setting but does not describe what it controls, the default, constraints, or when users should change it.

📌 Minimal addition example
 4. To make the custom local authenticator appear as a first-factor option in the {{ product_name }} Console application sign-in flow, add the following configuration to `deployment.toml` in `<IS_HOME>/repository/conf`.
+
+   - Controls: which custom local authenticators appear as first-factor options in the Console sign-in flow.
+   - Default: empty list.
+   - Constraints: array of authenticator names returned by `getName()`.
+   - Change this when: the authenticator does not appear in the Console sign-in flow after deployment.
 
     ``` toml
     [console.ui]
     login_flow_custom_first_factor_authenticators = [ "SampleLocalAuthenticator" ]
     ```

As per coding guidelines: “When documenting configuration, describe what the setting controls, state the default value, state constraints... and explain when the user should change it.”

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/includes/references/extend/authentication/write-a-custom-local-authenticator.md`
around lines 74 - 79, Add a short explanation for the
login_flow_custom_first_factor_authenticators setting: state that it controls
which custom local authenticators are exposed as first-factor options in the {{
product_name }} Console login flow UI, note the default is an empty list (no
custom first-factor authenticators), specify constraints that the value must be
a TOML array of authenticator IDs/names as strings that exactly match the
registered authenticator class/ID (e.g., "SampleLocalAuthenticator"), and
indicate when to change it (add entries when you implement and want a custom
local authenticator to appear as a first-factor option; remove when you no
longer want it shown).
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Nitpick comments:
In
`@en/includes/references/extend/authentication/write-a-custom-local-authenticator.md`:
- Line 74: Rewrite the sentence that currently reads "To ensure the custom local
authenticator is properly recognized as a first-factor option in the {{
product_name }} Console's application login flow UI, add the following
configuration to the `deployment.toml` file in the `<IS_HOME>/repository/conf`
folder." to use "sign-in", address the reader as "you", and use active
present-tense voice; for example, instruct the reader directly to "Add the
following configuration to the `deployment.toml` file in the
`<IS_HOME>/repository/conf` folder so your custom local authenticator appears as
a first-factor option in the {{ product_name }} Console's application sign-in
flow." Ensure you update the sentence containing "application login flow UI"
(search for "application login flow UI" or the deployment.toml mention) and keep
variable placeholders like {{ product_name }} unchanged.
- Around line 74-79: Add a short explanation for the
login_flow_custom_first_factor_authenticators setting: state that it controls
which custom local authenticators are exposed as first-factor options in the {{
product_name }} Console login flow UI, note the default is an empty list (no
custom first-factor authenticators), specify constraints that the value must be
a TOML array of authenticator IDs/names as strings that exactly match the
registered authenticator class/ID (e.g., "SampleLocalAuthenticator"), and
indicate when to change it (add entries when you implement and want a custom
local authenticator to appear as a first-factor option; remove when you no
longer want it shown).

ℹ️ Review info

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 2b77f6f and bc924b5.

📒 Files selected for processing (1)
  • en/includes/references/extend/authentication/write-a-custom-local-authenticator.md

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This pull request adds version-gated documentation (for versions 7.1.0 and next) that explains how to configure a custom local authenticator to be visible as a first-factor authentication option in the WSO2 Identity Server Console UI. The configuration requires adding a new TOML setting to the deployment.toml file.

Changes:

  • Added a new step 4 in the "Deploy the authenticator" section with version gating for 7.1.0 and next versions
  • Documented the [console.ui] configuration with the login_flow_custom_first_factor_authenticators parameter

Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧹 Nitpick comments (1)
en/includes/references/extend/authentication/write-a-custom-local-authenticator.md (1)

74-79: Document default and allowed values for login_flow_custom_first_factor_authenticators.

Please add the key’s default behavior and value constraints (type and accepted authenticator names) near this snippet. Right now the example is clear, but the setting contract is incomplete. As per coding guidelines, "When documenting configuration, describe what the setting controls, state the default value, state constraints (type, valid range, allowed values), provide a minimal example, and explain when the user should change it".

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/includes/references/extend/authentication/write-a-custom-local-authenticator.md`
around lines 74 - 79, Add a short explanatory paragraph next to the
deployment.toml snippet that documents the
login_flow_custom_first_factor_authenticators setting: state that it belongs
under [console.ui], controls which custom local authenticators appear as
first-factor options in the Console login flow, has a default of unset/empty (no
custom first-factor authenticators shown), accepts an array of strings
(authenticator names as registered with the server, e.g.,
"SampleLocalAuthenticator"), and that values must match the authenticator's
configured name; include a one-line note advising to add entries only when you
have implemented and registered a custom local authenticator.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Nitpick comments:
In
`@en/includes/references/extend/authentication/write-a-custom-local-authenticator.md`:
- Around line 74-79: Add a short explanatory paragraph next to the
deployment.toml snippet that documents the
login_flow_custom_first_factor_authenticators setting: state that it belongs
under [console.ui], controls which custom local authenticators appear as
first-factor options in the Console login flow, has a default of unset/empty (no
custom first-factor authenticators shown), accepts an array of strings
(authenticator names as registered with the server, e.g.,
"SampleLocalAuthenticator"), and that values must match the authenticator's
configured name; include a one-line note advising to add entries only when you
have implemented and registered a custom local authenticator.

ℹ️ Review info

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between bc924b5 and eeb9e3f.

📒 Files selected for processing (1)
  • en/includes/references/extend/authentication/write-a-custom-local-authenticator.md

JayaShakthi97 and others added 3 commits March 3, 2026 10:59
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
@JayaShakthi97 JayaShakthi97 force-pushed the custom-authenticator branch from 6200396 to 9cb05e1 Compare March 3, 2026 05:29
JayaShakthi97 and others added 2 commits March 10, 2026 09:54
Co-authored-by: Himesh Siriwardana <himesh.siriwardana@gmail.com>
Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In
`@en/includes/references/extend/authentication/write-a-custom-local-authenticator.md`:
- Around line 74-79: Update the doc block that shows
console.ui.login_flow_custom_first_factor_authenticators to state its accepted
values and default behavior: explain that the setting is an array of strings
(authenticator names returned by each authenticator's getName()), give the
minimal example already shown (e.g., "SampleLocalAuthenticator"), and note the
default (when the key is not set in {{ product_name }} 7.1.0 or `next` the
custom local authenticator remains hidden from the Console first-factor picker).
Also mention the constraint that only names returned by getName() are valid.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: b51be9ea-bd7c-44c6-a62e-811db8e2e3b8

📥 Commits

Reviewing files that changed from the base of the PR and between 2a2449f and 09e02b8.

📒 Files selected for processing (1)
  • en/includes/references/extend/authentication/write-a-custom-local-authenticator.md

Comment on lines +74 to +79
4. To ensure the custom local authenticator appears as a first-factor option in the {{ product_name }} Console login flow UI, add the following configuration to the `<IS_HOME>/repository/conf/deployment.toml` file.

``` toml
[console.ui]
login_flow_custom_first_factor_authenticators = [ "SampleLocalAuthenticator" ]
```
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟡 Minor

Document the setting's accepted values and default behavior.

This new console.ui.login_flow_custom_first_factor_authenticators example explains why to add the key, but it still leaves readers guessing what values the array accepts and what happens when they omit it. A short note that the list must contain authenticator names returned by getName(), and that the authenticator stays hidden from the Console first-factor picker when the key is not set, would make the step self-contained.

✏️ Suggested wording
 4. To ensure the custom local authenticator appears as a first-factor option in the {{ product_name }} Console login flow UI, add the following configuration to the  `<IS_HOME>/repository/conf/deployment.toml` file.
 
     ``` toml
     [console.ui]
     login_flow_custom_first_factor_authenticators = [ "SampleLocalAuthenticator" ]
     ```
+
+    This setting accepts a list of authenticator names returned by `getName()`. If you do not set this value in {{ product_name }} 7.1.0 or `next`, the custom local authenticator does not appear as a first-factor option in the Console UI.

As per coding guidelines, "When documenting configuration, describe what the setting controls, state the default value, state constraints (type, valid range, allowed values), provide a minimal example, and explain when the user should change it."

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@en/includes/references/extend/authentication/write-a-custom-local-authenticator.md`
around lines 74 - 79, Update the doc block that shows
console.ui.login_flow_custom_first_factor_authenticators to state its accepted
values and default behavior: explain that the setting is an array of strings
(authenticator names returned by each authenticator's getName()), give the
minimal example already shown (e.g., "SampleLocalAuthenticator"), and note the
default (when the key is not set in {{ product_name }} 7.1.0 or `next` the
custom local authenticator remains hidden from the Console first-factor picker).
Also mention the constraint that only names returned by getName() are valid.

@JayaShakthi97 JayaShakthi97 merged commit d0ca504 into wso2:master Mar 10, 2026
4 of 5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants