(→OIDC) |
|||
(5 intermediate revisions by 2 users not shown) | |||
Line 8: | Line 8: | ||
== Important information == | == Important information == | ||
− | SSO | + | Single Sign-On (SSO) offers benefits beyond reusing a central account, such as ensuring only the identity provider and browser see user credentials, and enforcing two-factor authentication (2FA). Organizations often secure HTTPS interactions by ensuring requests carry a session cookie from the identity provider or redirecting requests to the identity provider. |
− | + | While this works for web applications in browsers, it poses challenges for non-browser applications like daemon services or mobile apps. UBIK® addresses this by requiring a valid SSO login via a web browser to create session tokens for its own back channels, making interception by an application gateway not only ineffective but also problematic, as it prevents UBIK® from functioning. Therefore, UBIK® web service URLs must be excluded from 2FA rules on the application gateway to implement SSO securely. | |
+ | |||
+ | {{Hint|It is necessary to exclude {{UBIK}} web service URLs from any application gateway's 2FA redirect rules!}} | ||
+ | |||
+ | Concerns about breaching cybersecurity protocols are unfounded, as UBIK® ensures all sessions are secured via the identity provider. The responsibility for securing the back channel lies with UBIK®, as it is not a web application. | ||
+ | |||
+ | If there are further questions, support is available to help. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Login == | == Login == | ||
Line 155: | Line 154: | ||
{ | { | ||
// Here, we could update groups assignment or other account information. | // Here, we could update groups assignment or other account information. | ||
+ | // If the login object is modified here, please remember to call the login.Save() method before returning! | ||
} | } | ||
return login; | return login; | ||
Line 212: | Line 212: | ||
'ClientID' : '{clientid}', | 'ClientID' : '{clientid}', | ||
'ClientSecret' : null, | 'ClientSecret' : null, | ||
− | 'RedirectURL' : 'com.augmensys.ubik:// | + | 'RedirectURL' : 'com.augmensys.ubik://sso/', |
'Scope' : 'openid', | 'Scope' : 'openid', | ||
'UseAccessToken' : 'false'} | 'UseAccessToken' : 'false'} | ||
</syntaxhighlight> | </syntaxhighlight> | ||
+ | |||
+ | {{Attention|The "RedirectURL" is needed so that the SSO login process can be redirected back to the client after authentication. When using the Mobile clients, the custom protocol ("com.augmensys.ubik://sso/") might trigger a trust warning from some SSO providers (e.g. Entra), asking users to additionally confirm the login. If you want to avoid such warnings, it's possible to configure the so called "universal link" ("https://ubikapp.augmensys.com/sso/") as the RedirectURL instead. {{Version/XamarinSince|4.9}} This is not the case for the UWP client because there's no such trust warning problem and universal link is not properly supported on Windows anyway.}} | ||
+ | |||
+ | {{Hint|When using the universal link as the RedirectURL, the Mobile iOS client needs to open the Safari browser in order to successfully complete the login process. If you see the browser stuck on the {{UBIK}} SSO page and that it does not redirect to the client, please set Safari as the default browser. And the Mobile iOS client opens the Safari browser externally, because we found out that the redirect process requires user interaction even when the user has already previously logged in. (This is in line with what many others also experienced, like described in [https://stackoverflow.com/questions/44706216/universal-link-does-not-work-in-safari this example].) This means there will be a browser instance open in the background after you log in/out using SSO on a Mobile iOS client, which is unfortunately a technical limitation until Apple changes their universal link support.}} | ||
+ | |||
* Integrate client configuration in profile: | * Integrate client configuration in profile: | ||
<syntaxhighlight lang="xml"> | <syntaxhighlight lang="xml"> | ||
Line 227: | Line 232: | ||
</syntaxhighlight> | </syntaxhighlight> | ||
+ | {{Hint|Entra requires a client secret for web applications (to be configured both in Entra as well as in the client profile's OIDC settings described above). For native/mobile applications, the client secret must be null though!}} | ||
− | + | [[Category:How-To|Integrate UBIK in an SSO Environment]] | |
− | + | [[Category:SSO|Integrate UBIK in an SSO Environment]] | |
+ | [[Category:Version 3.6|Integrate UBIK in an SSO Environment]] | ||
== SAML == | == SAML == |
Latest revision as of 11:26, 22 September 2025
Single Sign-On (SSO) allows an end-user to interact with multiple services without logging in more than once.
This page shows how to integrate UBIK® into such an SSO environment.