Difference between revisions of "HowTo:Integrate UBIK in an SSO Environment"
(→Important information) |
|||
| Line 7: | Line 7: | ||
= Instructions = | = Instructions = | ||
| − | = Important information: Reverse Proxies = | + | == Important information: Reverse Proxies == |
Single Sign-On (SSO) offers benefits beyond reusing a central account, such as ensuring only the identity provider and browser see user credentials, enforcing two-factor authentication (2FA), and shielding intranet servers via reverse proxy checking for valid SSO sessions. Organizations often secure HTTPS interactions by ensuring requests carry a session cookie or bearer token from the identity provider, otherwise redirecting requests to the identity provider. | Single Sign-On (SSO) offers benefits beyond reusing a central account, such as ensuring only the identity provider and browser see user credentials, enforcing two-factor authentication (2FA), and shielding intranet servers via reverse proxy checking for valid SSO sessions. Organizations often secure HTTPS interactions by ensuring requests carry a session cookie or bearer token from the identity provider, otherwise redirecting requests to the identity provider. | ||
| Line 16: | Line 16: | ||
If there are further questions, support is available to help. | If there are further questions, support is available to help. | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
== Login == | == Login == | ||
Latest revision as of 15:02, 2 April 2026
Single Sign-On (SSO) allows an end-user to interact with multiple services without logging in more than once.
This page shows how to integrate UBIK® into such an SSO environment.
