Difference between revisions of "HowTo:Integrate UBIK in an SSO Environment"
(→Studio) |
|||
Line 6: | Line 6: | ||
= Instructions = | = Instructions = | ||
+ | |||
+ | == Important information == | ||
+ | SSO has additional benefits, other than "just" reusing a central account and session. It also makes sure that no application other than the identity provider (and the browser) ever gets to see the user's credentials, and two-factor-authentication (2FA) can be enforced. | ||
+ | |||
+ | Some organizations do this by restricting every HTTPS interaction in their network, making sure that all requests carry a session cookie known by the identity provider, or otherwise redirecting the request to the identity provider (via an application gateway, reverse proxy or load balancer), so the user can login right away with their browser. | ||
+ | |||
+ | This works out well for all web applications running in the user's browser. However, many applications do not run within the user's browser, like for example demon services, or native mobile applications. But such applications often still use HTTPS to interact with other services or even their own servers, just not using a browser. This is also true for {{UBIK}}. | ||
+ | |||
+ | So how can such browser-less interactions be secured with SSO? {{UBIK}} can be configured to require a valid SSO login via the user's web browser to create surrogate session tokens for the browser-less back channels. This renders interception by an application gateway not only useless, but also obstructive. | ||
+ | |||
+ | '''In other words, it is mandatory to exclude the {{UBIK}} web service URLs from 2FA rules on the application gateway, so {{UBIK}} can implement SSO securely without being a web application.''' | ||
+ | |||
+ | We've had the situation multiple times that customers or partners are worried that this is a breach of their cyber security protocols. | ||
+ | This is not the case: We have ensured that {{UBIK}} can be configured to prevent ANY session that is not secured via the identity provider! The responsibility for securing the back channel has to be with {{UBIK}} though, otherwise it cannot work technically, because {{UBIK}} is not a web application where all communication runs via the browser. | ||
+ | |||
+ | We understand this is a complex topic. Please don't hesitate to approach our support if there are further questions! | ||
== Login == | == Login == | ||
Line 31: | Line 47: | ||
With this, the {{UBIK}} session in the web service's {{UBIK}} Environment is tagged with the SSO token, and the customizing code can use it to interact with 3rd party systems. | With this, the {{UBIK}} session in the web service's {{UBIK}} Environment is tagged with the SSO token, and the customizing code can use it to interact with 3rd party systems. | ||
− | + | ||
− | + | ||
− | + | ||
= Studio = | = Studio = | ||
Line 182: | Line 198: | ||
</syntaxhighlight> | </syntaxhighlight> | ||
− | + | ||
− | + | ||
− | + | ||
= Client = | = Client = | ||
Line 211: | Line 227: | ||
</syntaxhighlight> | </syntaxhighlight> | ||
− | + | ||
− | + | ||
− | + | ||
== SAML == | == SAML == |
Revision as of 15:14, 4 October 2024
Single Sign-On (SSO) allows an end-user to interact with multiple services without logging in more than once.
This page shows how to integrate UBIK® into such an SSO environment.