Configuration of IAM mappings

Upload mapping templates to Airlock Gateway

With Airlock IAM 8.0 the support for JSP-Loginapp has been removed and the Airlock Gateway templates have been updated accordingly. The linked templates on this page support Loginapp REST UI IAM configurations only.

For the latest available JSP-Loginapp compatible templates, choose Airlock IAM 7.7 templates for Airlock Gateway.

  1. Create one of more new mappings for Airlock IAM modules
  2. Download the appropriate mapping template:
  3. Airlock Gateway Version

    IAM Loginapp Template

    IAM Adminapp Template

    IAM Transaction Approval Template

    7.6 and newer

  4. In the Airlock Gateway Configuration Center, go to:
    Application Firewall >> Reverse Proxy
  5. Import the downloaded mapping template.
  6. Import new mapping
  7. For the Loginapp, for example, this will add three new and unconnected mapping templates to the mapping list:
  8. Mapping Template


    Used for


    Basic Loginapp mapping

    Used for all IAM Loginapp features (including REST APIs)


    Loginapp REST API mapping for protected calls

    Used for API Enforcement applied to the protected part of the Loginapp REST API


    Loginapp REST API mapping for public calls

    Used for API Enforcement applied to the public part of the Loginapp REST API

Using and adapting the basic Loginapp mapping (Airlock-IAM-Loginapp)

  1. After uploading the templates, adapt the basic template:
  2. Set the entry- and back-end paths:
    • Change the entry path to your needs. The default value /auth will work with most other Airlock IAM tutorials and is recommended to be used.
    • Change the back-end path to point to the corresponding Loginapp instance's context path (for example /prod-login).

    To find out the context path of a Loginapp, you may use the following CLI command:

    iam info -i auth | grep iam.loginapp.url.path
  3. Change the Allow Rules tab of the mapping and activate the allow rules corresponding to all required Loginapp functionalities. For security reasons, only activate those allow-rules that are needed.
  4. Example:

  5. Connect the Airlock IAM mapping to a virtual host and a back-end group.
  6. Activate the configuration.

Using the API Enforcement feature to protect IAM's Loginapp REST API

  • The Airlock Gateway's API Enforcement feature validates each REST request against the OpenAPI specification (OAS) of an API.
  • IAM provides an OpenAPI Specification (OAS) file with each version: see OpenAPI specification for details.

After preparing and uploading the OpenAPI specification to the Airlock Gateway (according to OpenAPI specification), make sure to update the IAM OpenAPI specification when upgrading.

CSRF protection

  • CSRF token protection of Airlock Gateway:
  • The gateway CSRF token protection feature is activated on all Loginapp REST mappings using the mapping template 7.6 and newer.
  • This may require small changes to custom single-page applications to handle possible CSRF blocks. If this is not possible, the CSRF protection on these mappings can be disabled to return to the previous behavior.