Single sign-on is a key feature of the WSO2 Identity Server that enables users to access multiple applications using the same set of credentials. Additionally, the user can access all these applications without having to log into each and every one of them individually. For instance, if users log into application A, they would automatically have access to application B as well for the duration of that session without having to re-enter their credentials.
...
Excerpt | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
To obtain and configure the single sign-on travelocity sample, follow the steps below.
Now the web application is successfully deployed on a web container. |
...
Field | Description | Sample Value | ||
---|---|---|---|---|
Issuer | This is the entity ID for the SAML2 service provider
| travelocity.com | ||
Assertion Consumer URLs | This is the Assertion Consumer Service (ACS) URL of the service provider. The identity provider redirects the SAML2 response to this ACS URL. However, if the SAML2 request is signed and SAML2 request contains the ACS URL, the Identity Server will honor the ACS URL of the SAML2 request.
| Enter this value: http://wso2is.local:8080/travelocity.com/home.jsp and click Add. | ||
Default Assertion Consumer URL | This must be the same value defined above. If you have defined multiple Assertion Consumer URLs, this value must be the same as the SAML2.AssertionConsumerURL value mentioned inside the travelocity.com/WEB-INF/classes/travelocity.properties file as that is the default. | |||
NameID format | The service provider and identity provider usually communicate with each other regarding a specific subject. That subject should be identified through a Name-Identifier (NameID) , which should be in some format so that It is easy for the other party to identify it based on the format. There are some formats that are defined by SAML2 specification. Enter the default value of this format (urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress ) | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress | ||
Certificate Alias | This is used to validate the signature of SAML2 requests and is used to generate encryption. | Select In a tenant : Select the Certificate Alias with tenant domain name | ||
Response Signing Algorithm | Specifies the ‘SignatureMethod’ algorithm to be used in the ‘Signature’ element in POST binding. The default value can be configured in the<IS_HOME>/repository/conf/identity/identity.xml file, in the SSOService element with SAMLDefaultSigningAlgorithmURI tag. If it is not provided, the default algorithm is RSASHA 1, at URI ‘http://www.w3.org/2000/09/xmldsig#rsasha1 ’. |
| ||
Response Digest Algorithm | Specifies the ‘DigestMethod’ algorithm to be used in the ‘Signature’ element in POST binding. The default value can be configured in the<IS_HOME>/repository/conf/identity/identity.xml file, in the SSOService element with SAMLDefaultDigestAlgorithmURI tag. If it is not provided the default algorithm is SHA 1, at URI ‘http://www.w3.org/2000/09/xmldsig#sha1 ’. |
| ||
Enable Response Signing | This is used to sign the SAML2 Responses returned after the authentication process is complete. | Set as true by selecting the checkbox | ||
Enable Signature Validation in Authentication Requests and Logout Requests | This specifies whether the identity provider must validate the signature of the SAML2 authentication request and the SAML2 logout request that are sent by the service provider. | Leave unchecked for travelocity sample | ||
Enable Assertion Encryption | This defines whether the SAML2 assertion must be encrypted or not. | Leave unchecked for travelocity sample | ||
Enable Single Logout | Enable this to ensure that all sessions are terminated once the user signs out from one server. | Set this as true by selecting the checkbox | ||
SLO Response URL | If the service provider has a different endpoint that accepts the single logout response other than the assertion consumer URL, you can provide that endpoint value here. | |||
SLO Request URL | If the service provider has a different endpoint that accepts single logout requests from the identity server other than the assertion consumer URL, you can provide that endpoint value here. | |||
Logout Method |
SAML single logout is supported by both SAML Back-Channel Logout and SAML Front-Channel Logout methods. By default, when you select Enable Single Logout, it will enable Back-Channel Logout . In order to enable SAML Front-Channel Logout, you can either select Front-Channel Logout (HTTP Redirect Binding) or Front-Channel Logout (HTTP POST Binding) . | Select Back-Channel Logout for travelocity sample | ||
Enable Attribute Profile | The Identity Server supports a basic attribute profile where the identity provider can include the user’s attributes in the SAML Assertions as an attribute statement. You can define the claims that must be included under service provider claim configurations. Also, once you select the “Include Attributes in the Response Always” checkbox, the identity provider always includes the attribute values related to selected claims in the SAML Attribute statement. | Leave unchecked for travelocity sample | ||
Enable Audience Restriction | You can define multiple audiences in the SAML Assertion. Configured audiences would be added to the SAML2 Assertion. | Leave unchecked for travelocity sample | ||
Enable IdP Initiated SSO | Depending on your application flow you can choose whether to enable IdP initiated SSO. The IdP initiated SSO profile enables to start an authentication flow by sending a GET request to the Identity server with the following format.
| Leave unchecked for travelocity sample | ||
Enable IdP initiated SLO | The Identity Server facilitates IdP initiated SAML2 single log out requests. This is useful if the application can not manage the session index received with the SAML response and still wants to perform log out. The following parameters can be used with the IdP initiated SLO request:
| Leave unchecked for travelocity sample | ||
Enable Assertion Query Request Profile | Enable Assertion Query Request Profile can used for query assertions following SAML2.0 specification. This can query assertions that are persisted to the database when you login to the service provider application. For more information, see Querying SAML Assertions. | Leave unchecked for travelocity sample |
...