Administrative management of SSO
Differentiating SSO behavior for applications and clients
In this article will take a look at some typical use-cases and how you can benefit from a differentiated approach to how the SSO for the clients is handled from the operational perspective.
Learn the basics of SSOFor a general overview of SSO with OpenID Connect, see Web Client SSO with OpenID Connect
There may be situations where you want to provide SSO functionality to only parts of a collection of services, or only to selected applications. Or maybe some clients should have sessions with a shorter lifetime.
In order for SSO to be established, there are a few requirements:
- Sites must share ACR:s (Authenticators)
- SSO session must exist
- SSO session is fresh
- No client prompts
In order for SSO to work, the sites must have the same ACR in their requests and configuration. So for example if the user logs in with html-form in the first site, and the second site requires a social login, SSO will not occur.
There must exist an authenticated session (SSO session) for SSO to work. This might perhaps sound like pointing out the obvious, but there is a bit more to it, since the SSO session also must match the parameters provided in the client request.
The duration of the session is normally configured in the authentication profile (by authenticator) in Curity, but the client can also specify in the request a desired freshness using the
max_age parameter, and thereby implicitly request a new login, if the available SSO session is too old.
The client may prompt for authentication, in which case SSO will not be allowed - the client explicitly asked for the user to login again.
Given the above requirements for SSO it’s possible to manage when it occurs both from a administrator point of view and from a Client developer’s point of view.
Being able to make an administrative decision on how different clients should behave when it comes to SSO is very valuable when you have a range of clients with different use-cases or access needs.
For example, you might want to allow one client to modify data but with a stricter SSO schema, while a different client can only create reports from the data, but can have a more lax SSO implementation.
The Curity Identity Server administrator has the following options to allow for SSO:
- Define the clients that should participate in SSO
- Make sure these share Authenticator settings. I.e. have the same subset of authenticators configured
- Ensure that none of the clients is configured with
To exclude a client from SSO the following can be done:
- Use a different authenticator for that client
force-authnon that client
Force Re-Authentication (
force-authn) can be configured on a client. This is the same as if the client always would send the
prompt=login request parameter.
For more information, see the Curity Developer Portal on SSO.
Let’s Stay in Touch!
Get the latest on identity management, API Security and authentication straight to your inbox.