Difference between revisions of "HowTo:Integrate UBIK in an SSO Environment"
| (One intermediate revision by the same user not shown) | |||
| Line 7: | Line 7: | ||
= Instructions = | = Instructions = | ||
| − | == Important information == | + | == Important information: Reverse Proxies == |
| − | + | ||
| − | + | Single Sign-On (SSO) offers benefits beyond reusing a central account, such as ensuring only the identity provider and browser see user credentials, enforcing two-factor authentication (2FA), and shielding intranet servers via reverse proxy checking for valid SSO sessions. Organizations often secure HTTPS interactions by ensuring requests carry a session cookie or bearer token from the identity provider, otherwise redirecting requests to the identity provider. | |
| − | {{ | + | {{UBIK}} supports this, too, by providing the SSO bearer token within the "Authorization" header for every request. A reverse proxy can verify this token or prevent access otherwise. Unfortunately, Microsoft Entry Application Proxy - even with the helpful-sounding "header-based SSO" configuration - is unable to just check this header without dropping the data when forwarding the incoming message to {{UBIK}}. Hence, with the Microsoft Entra Application Proxy the only way is to deactivate the check. Also, any method checking the session cookie is doomed to fail because for the backchannel, {{UBIK}} doesn't have any access to the browser's cookies, just to the SSO token. |
| − | + | {{Hint|With Microsoft Entra Application Proxy, it is necessary to exclude {{UBIK}} web service URLs from the 2FA redirect rules!}} | |
If there are further questions, support is available to help. | If there are further questions, support is available to help. | ||
| − | |||
| − | |||
| − | |||
| − | |||
== Login == | == Login == | ||
Latest revision as of 15:02, 2 April 2026
Single Sign-On (SSO) allows an end-user to interact with multiple services without logging in more than once.
This page shows how to integrate UBIK® into such an SSO environment.
