Difference between revisions of "HowTo:Integrate UBIK in an SSO Environment"
(→Important information) |
(→OIDC) |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 11: | Line 11: | ||
While this works for web applications in browsers, it poses challenges for non-browser applications like daemon services or mobile apps. UBIK® addresses this by requiring a valid SSO login via a web browser to create session tokens for its own back channels, making interception by an application gateway not only ineffective but also problematic, as it prevents UBIK® from functioning. Therefore, UBIK® web service URLs must be excluded from 2FA rules on the application gateway to implement SSO securely. | While this works for web applications in browsers, it poses challenges for non-browser applications like daemon services or mobile apps. UBIK® addresses this by requiring a valid SSO login via a web browser to create session tokens for its own back channels, making interception by an application gateway not only ineffective but also problematic, as it prevents UBIK® from functioning. Therefore, UBIK® web service URLs must be excluded from 2FA rules on the application gateway to implement SSO securely. | ||
+ | |||
+ | {{Hint|It is necessary to exclude {{UBIK}} web service URLs from any application gateway's 2FA redirect rules!}} | ||
Concerns about breaching cybersecurity protocols are unfounded, as UBIK® ensures all sessions are secured via the identity provider. The responsibility for securing the back channel lies with UBIK®, as it is not a web application. | Concerns about breaching cybersecurity protocols are unfounded, as UBIK® ensures all sessions are secured via the identity provider. The responsibility for securing the back channel lies with UBIK®, as it is not a web application. | ||
Line 16: | Line 18: | ||
If there are further questions, support is available to help. | If there are further questions, support is available to help. | ||
− | + | ||
− | + | ||
− | + | ||
== Login == | == Login == | ||
Line 167: | Line 169: | ||
</div></div> | </div></div> | ||
− | + | ||
− | + | ||
− | + | ||
== Interfacing == | == Interfacing == | ||
Line 210: | Line 212: | ||
'ClientID' : '{clientid}', | 'ClientID' : '{clientid}', | ||
'ClientSecret' : null, | 'ClientSecret' : null, | ||
− | 'RedirectURL' : 'com.augmensys.ubik:// | + | 'RedirectURL' : 'com.augmensys.ubik://sso/', |
'Scope' : 'openid', | 'Scope' : 'openid', | ||
'UseAccessToken' : 'false'} | 'UseAccessToken' : 'false'} | ||
</syntaxhighlight> | </syntaxhighlight> | ||
+ | |||
+ | {{Attention|The "RedirectURL" is needed so that the SSO login process can be redirected back to the client after authentication. When using the Mobile clients, the custom protocol ("com.augmensys.ubik://sso/") might trigger a trust warning from some SSO providers (e.g. Entra), asking users to additionally confirm the login. If you want to avoid such warnings, it's possible to configure the so called "universal link" ("https://ubikapp.augmensys.com/sso/") as the RedirectURL instead. {{Version/XamarinSince|4.9}} This is not the case for the UWP client because there's no such trust warning problem and universal link is not properly supported on Windows anyway.}} | ||
+ | |||
+ | {{Hint|When using the universal link as the RedirectURL, the Mobile iOS client needs to open the Safari browser in order to successfully complete the login process. If you see the browser stuck on the {{UBIK}} SSO page and that it does not redirect to the client, please set Safari as the default browser. And the Mobile iOS client opens the Safari browser externally, because we found out that the redirect process requires user interaction even when the user has already previously logged in. (This is in line with what many others also experienced, like described in [https://stackoverflow.com/questions/44706216/universal-link-does-not-work-in-safari this example].) This means there will be a browser instance open in the background after you log in/out using SSO on a Mobile iOS client, which is unfortunately a technical limitation until Apple changes their universal link support.}} | ||
+ | |||
* Integrate client configuration in profile: | * Integrate client configuration in profile: | ||
<syntaxhighlight lang="xml"> | <syntaxhighlight lang="xml"> |
Latest revision as of 11:26, 22 September 2025
Single Sign-On (SSO) allows an end-user to interact with multiple services without logging in more than once.
This page shows how to integrate UBIK® into such an SSO environment.