copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2022-05-17 |
single sign on, cloud directory, saml, app security, application identity |
appid |
{:codeblock: .codeblock} {:screen: .screen} {:download: .download} {:external: target="_blank" .external} {:faq: data-hd-content-type='faq'} {:gif: data-image-type='gif'} {:important: .important} {:note: .note} {:pre: .pre} {:tip: .tip} {:preview: .preview} {:deprecated: .deprecated} {:beta: .beta} {:term: .term} {:shortdesc: .shortdesc} {:script: data-hd-video='script'} {:support: data-reuse='support'} {:table: .aria-labeledby="caption"} {:troubleshoot: data-hd-content-type='troubleshoot'} {:help: data-hd-content-type='help'} {:tsCauses: .tsCauses} {:tsResolve: .tsResolve} {:tsSymptoms: .tsSymptoms} {:java: .ph data-hd-programlang='java'} {:javascript: .ph data-hd-programlang='javascript'} {:swift: .ph data-hd-programlang='swift'} {:curl: .ph data-hd-programlang='curl'} {:video: .video} {:step: data-tutorial-type='step'} {:tutorial: data-hd-content-type='tutorial'} {:ui: .ph data-hd-interface='ui'} {:cli: .ph data-hd-interface='cli'} {:api: .ph data-hd-interface='api'} {:release-note: data-hd-content-type='release-note'}
{: #cd-sso}
With Single sign-on (SSO) for Cloud Directory, you can provide a smooth authentication experience between multiple web apps. If SSO is turned on when a user initially signs in, they are not required to reenter their credentials the next time they sign-in. Instead, they are automatically signed in to any of your apps that are protected by the same {{site.data.keyword.appid_short_notm}} instance. {: shortdesc}
{{site.data.keyword.appid_short_notm}} provides SSO for Cloud Directory users. If you use a social or federated SAML identity provider SSO is managed by that provider and {{site.data.keyword.appid_short_notm}} respects it. {: note}
{: #cd-sso-how-it-works}
Check out the following diagram to see SSO in action.
{: caption="Figure 1. Cloud Directory SSO flow" caption-side="bottom"}
- A Cloud Directory user signs in to your app for the first time.
- They are asked to authenticate by providing either a username or email and password.
- If the credentials are valid, a user is signed in to your app. At the same time, {{site.data.keyword.appid_short_notm}}, creates a session and sets a cookie on the user's browser.
- If a user attempts to sign in to one of your other applications, {{site.data.keyword.appid_short_notm}} detects the session cookie and automatically signs the user into your app. {{site.data.keyword.appid_short_notm}} session cookies are instance-specific and are signed by the instance's unique private key.
Currently, Cloud Directory SSO is configured to work when Cloud Directory is the only enabled identity provider. If your instance of {{site.data.keyword.appid_short_notm}} is configured to use multiple identity providers, enabling SSO has no effect on the sign-in flow. Users are prompted to enter their Cloud Directory credentials or choose one of the other providers at every sign-in. {: note}
{: #cd-sso-configure}
You can configure single sign-on by using the {{site.data.keyword.appid_short_notm}} dashboard or by using the APIs. {: shortdesc}
{: #cd-sso-configure-gui}
You can configure the SSO through the GUI.
-
Navigate to the Cloud Directory > Single Sign-on tab of the {{site.data.keyword.appid_short_notm}} dashboard.
-
Toggle Enable single sign-on to Enabled.
-
Set the amount of time that a user can be inactive before the SSO session expires. When it expires, they must sign in again. The time is specified in minutes and the maximum allowed time for inactivity is 10,080 minutes (7 days). The default time is 1440 minutes, which is the equivalent of 1 day.
-
Add your redirect URIs to the Logout redirect URI box and click the + sign. Be sure to register only applications that you trust. By registering the URI, you're authorizing {{site.data.keyword.appid_short_notm}} to include it in the authorization workflow.
-
Click Save.
{: #cd-sso-configure-api}
By using the SSO Configuration Admin API to define three settings, you can turn on the feature.
An example call:
{
"isActive": true,
"inactivityTimeoutSeconds": 86400,
"logoutRedirectUris": [
"http://my-first-app.com/after_logout",
"http://my-second-app.com/after_logout"
]
}
{: screen}
Setting | Definition |
---|---|
isActive |
To enable SSO, set this value to true . The default setting is false . |
inactivityTimeoutSeconds |
The longest length of time that can pass without any user activity before the user is required to reenter their credentials. This value is specified in seconds and can be a maximum of 604800 seconds (7 days). The default setting is 86400 seconds (1 day). |
logoutRedirectUris |
A comma-separated list of allowed URIs that {{site.data.keyword.appid_short_notm}} can redirect your users to after they sign out. |
{: caption="Table 1. SSO configuration settings" caption-side="top"} |
{: #cd-sso-log-out}
With {{site.data.keyword.appid_short_notm}}, you can end a user's SSO session for their current browser. If the API endpoint is accessed by the user's browser, their session is terminated and the user is prompted to enter their credentials on their next sign-in attempt in that browser - for any of your apps. {: shortdesc}
When one of the flows that are related to changing, resetting, or renewing a password is started, the sessions across all clients are automatically terminated for the user. {: note}
{: #cd-sso-log-out-api}
To sign out a user, redirect their browser by using your information to complete the following API call.
https://<region>.appid.cloud.ibm.com/oauth/v4/<tenantID>/cloud_directory/sso/logout?redirect_uri=<redirectURI>&client_id=<clientID>
{: codeblock}
Variable | Value |
---|---|
region |
The region in which your instance of {{site.data.keyword.appid_short_notm}} is provisioned. Learn more about the available regions. |
tenantID |
The unique identifier for your instance of {{site.data.keyword.appid_short_notm}}. You can find this value in the Service Credentials tab of the {{site.data.keyword.appid_short_notm}} dashboard. If you do not have a set of service credentials, you can create one and take the value from there. |
redirectURI |
A URI that you specified in your SSO configuration through the {{site.data.keyword.appid_short_notm}} dashboard. For security reasons, if you do not specify a value redirection cannot occur and an error is displayed. |
clientID |
Your application's client ID. |
{: caption="Table 2. SSO sign-out API call variables" caption-side="top"} |
Even if the SSO session is ended, a user with a valid access token that is stored in their session might not be required to enter their credentials again until their token expires. By default the token expires after 1 hour. {: note}
{: #cd-sso-log-out-nodejs}
You can also use the {{site.data.keyword.appid_short_notm}} Node.js server SDK to automatically handle the redirection for you.
-
Set
logoutSSO
as a method. For example:let webAppStrategy = new WebAppStrategy(.....); .... webAppStrategy.logoutSSO();
{: codeblock}
-
Configure logout.
app.get('/logoutSSO', (req, res) => { res.clearCookie("refreshToken"); webAppStrategy.logoutSSO(req,res, { "redirect_uri": "https://my-app.com/after_logout" }); });
{: codeblock}
{: #cd-sso-ending-all-sessions}
As an administrator, you can end all SSO sessions for any user by using the {{site.data.keyword.appid_short_notm}} admin APIs. The APIs are protected by a Cloud IAM token.
Example API request:
POST https://<region>.appid.cloud.ibm.com/management/v4/<tenantID>/cloud_directory/Users/<userID>/sso/logout
Headers:
Authorization: Bearer <IAMToken>
{: codeblock}
Variable | Value |
---|---|
region |
The region in which your instance of {{site.data.keyword.appid_short_notm}} is provisioned. Learn more about the available regions. |
tenantID |
The unique identifier for your instance of {{site.data.keyword.appid_short_notm}}. You can find this value in the Service Credentials tab of the {{site.data.keyword.appid_short_notm}} dashboard. If you do not have a set of service credentials, you can create one and take the value from there. |
userID |
The unique identifier for a Cloud Directory user. You can obtain the ID by using the Cloud Directory Users APIs, or by viewing the user's identity token. |
{: caption="Table 3. Variables that are needed to end all SSO sessions for a user" caption-side="top"} |
When you invoke this API, all the specified user's SSO sessions are invalidated. This means that the next time that the user attempts to sign in to any of your apps, from any device or browser, they are required to reenter their credentials.