Skip to content

Configuring Instagram Authenticator


This authenticator is now deprecated as the Instagram API Platform which supported authentication is no longer available. The Facebook Authenticator can be used as an alternative to this.

The Instagram authenticator allows users to log in to your organization's applications using Instagram, which is an online mobile photo-sharing, video-sharing, and social networking service. The Instagram authenticator is configured as a federated authenticator in WSO2 Identity Server.

This page provides instructions on how to configure the Instagram authenticator and Identity Server using a sample app. You can find more information in the following sections.


To download the authenticator and other artifacts, go to .


This is tested with the Instagram API version 1.0 (v1). Instagram authenticator is supported by Identity Server 5.1.0 upwards.

Deploying Instagram artifacts

  • Place the Instagram authenticator .jar file ( org.wso2.carbon.extension.identity.authenticator.instagram.connector-X.X.X.jar ) into the <IS_HOME>/repository/components/dropins directory. You can download this from the store .


    If you want to upgrade the Instagram Authenticator (.jar) in your existing IS pack, please refer upgrade instructions.

Configuring the Instagram App

  1. Download the Instagram app for iOS from the App Store, Android from Google Play Store or Windows Phone from the Windows Phone Store.
  2. Once the app is installed, tap to open it.
  3. Sign up and create an account using your email ID.
  4. Navigate to and log in using the credentials that you used to create the account.
  5. Navigate to and click the ' Register Your Application ' button and register a new client.
  6. Use https://localhost:9443/commonauth as the redirect URL when you register the client.


    If you are getting an error while registering you may have to "Disable Content Security Policy". It is recommended to enable content security policy, once you registered into the app.

  7. From the app dashboard you can get the clientId and clientSecret for your created app.

Deploying sample app

The next step is to deploy and configure travelocity application. See deploy the sample app for more information on configuring travelocity application.

Configuring the identity provider

Now you have to configure WSO2 Identity Server by adding a new identity provider .

  1. Download the WSO2 Identity Server from here.
  2. Go to in your browser, and then click the HTTPS trust icon on the address bar (e.g., the padlock next to the URL) to download the certificate. If you are using google chrome please follow the steps of inspecting certificates in chrome to export the certificate.

  3. Import that certificate into the IS client keystore by running the following command on your command line.
    keytool -importcert -file <certificate file> -keystore < IS_HOME >/repository/resources/security/client-truststore.jks -alias "Instagram"


    Note that 'wso2carbon' is the keystore password of the default client-truststore.jks file. We need the certificate in order to validate the signature. Otherwise, it is unable to prove that the response is sent by the relevant identity provider we configured.

  4. Run the WSO2 Identity Server.

  5. Log in to the management console as an administrator.
  6. In the Identity Providers section under the Main tab of the management console, click Add.
  7. Give a suitable name for Identity Provider Name and configure the authenticator. To do this, navigate to Instagram Configuration under Federated Authenticators and fill the form.

    Do the following configurations.

    Field Description Sample value
    Enable Selecting this option enables Instagram to be used as an authenticator for users provisioned to the Identity Server. Selected
    Default Selecting the Default checkbox signifies that Instagram is the main/default form of authentication. This removes the selection made for any other Default checkboxes for other authenticators. Selected
    Client Id This is the username from the Instagram application. aa6f12fd086e4b58a6707d5b61377a71
    Client Secret This is the password from the Instagram application. Click the Show button to view the value you enter. fffc3f4808f34e01b0bc529ce78f5980
    Callback URL This is the URL to which the browser should be redirected after the authentication is successful. It should have this format: https://(host-name):(port)/acs. https://localhost:9443/commonauth
  8. Select both checkboxes to Enable the Instagram authenticator and make it the Default.

  9. Click Register.

You have now added the identity provider.

Configuring the service provider

The next step is to configure the service provider.

  1. In the previous section of this guide you have deployed and registered the webapp. Let's edit the same service provider to configure instagram as the identity provider.

  2. Locate the "" service provider and navigate to the Local and Outbound Authentication Configuration section.

  3. Select the identity provider you created from the dropdown list under Federated Authentication.

  4. Ensure that the Federated Authentication radio button is selected and click Update to save the changes.

You have now added and configured the service provider.

Related Topics

For more information on service provider configuration, see Configuring SAML2 Web Single Sign-On .

Configuring claims

This involves adding a new claim mapping for various user attributes related to Instagram.

  • In the Main menu, click Add under Claims.
  • Click Add New Claim Dialect to create the Instagram authenticator specific claim dialect.
  • Specify the Dialect Uri as and create claims. It is required to create at least one claim under this new dialect. Therefore, create the claim for the Instagram user ID while creating the claim dialect. Enter the following values the form.
  • Click Add to add the new claim.
  • Similarly, you can create claims for all the public information of the Instagram user. Add the following claims under the dialect

  • You can create the local claim to map it with the Instagram claim. Create the local claim with the map attribute profile picture.

Configuring requested claims for

  1. In the Identity section under the Main tab, click List under Service Providers.
  2. Click Edit to edit the service provider.
  3. Expand the Claim Configuration section.
  4. Click on Add Claim URI under Requested Claims to add the requested claims as indicated in the image below. Here you must add the claims you mapped in the Identity Provider claim configuration.

Testing the sample

  1. To test the sample, go to the following URL: http://<TOMCAT_HOST>:<TOMCAT_PORT>/ . E.g., http://wso2is.local:8080/

  2. Click the option available to login with SAML from the WSO2 Identity Server.

  3. Enter your Instagram credentials in the prompted login page of Instagram. Once you login successfully you will be taken to the home page of the app.