SingleSignOnFilter
Tests for the presence and validity of an SSO token in the cookie header of a request:
If an SSO token is present, the filter calls AM to validate the SSO token. If the SSO token is valid, the request continues along the chain. The token value and additional information are stored in the
ssoToken
context. For information, see "SsoTokenContext".If the SSO token is not present, or is empty or invalid, IG checks the
goto
query parameter for the presence of the_ig
marker parameter:If the marker parameter is present (
_ig=true
), IG fails the request because the cookie domain is incorrectly configured.If the marker parameter is not present (
_ig=false
), IG redirects the user-agent for authentication to the AM login page or another provided login page.
Supported with AM 5 and later versions.
For more information about SSO, see Single Sign-On and Cross-Domain Single Sign-On.
Tip
To prevent issues with performance when accessing large resources, such as .jpg and .js files, consider using the SingleSignOnFilter with the following options:
The
sessionCache
, so that IG can reuse session token information without repeatedly asking AM to verify the session token.A ConditionalFilter, so that requests to access large resources skip the SingleSignOnFilter. For an example configuration, see the example in "ConditionalFilter".
Note
When AM is using CTS-based sessions, it does not monitor idle time for client-based sessions, and so refresh requests are ignored.
When the SingleSignOnFilter is used for authentication with AM, after a time AM can view the session as idle even though the user continues to interact with IG. The user session can eventually time out.
(From AM 6.5.3.) When AM is using CTS-based sessions, use the sessionIdleRefresh
property of AmService to refresh idle sessions, and prevent unwanted timeouts.
WebSocket Notifications for Sessions
When WebSocket notifications are set up for sessions, IG receives a notification from AM when a user logs out of AM, or when the AM session is modified, closed, or times out. IG then evicts entries that are related to the event from the sessionCache
.
For information about setting up WebSocket notifications, using them to clear the session cache, and including them in the server logs, see "WebSocket Notifications".
Usage
{ "name": string, "type": "SingleSignOnFilter", "config": { "amService": AmService reference, "authenticationService": configuration expression<string>, "realm": string, "defaultLogoutLandingPage": configuration expression<url>, "loginEndpoint": runtime expression<url>, "logoutExpression": runtime expression<boolean> } }
Properties
"amService"
: AmService reference, requiredAn AmService object to use for the following properties:
agent
, the credentials of the IG agent in AM. When the agent is authenticated, the token can be used for tasks such as getting the user's profile, making policy evaluations, and connecting to the AM notification endpoint.realm
: Realm of the IG agent in AM.url
, the URL of an AM service to use for session token validation and authentication whenloginEndpoint
is not specified.ssoTokenHeader
, the name of the cookie that contains the session token created by AM.amHandler
, the handler to use when communicating with AM to validate the token in the incoming request.sessionCache
, the configuration of a cache for session information from AM.version
: The version of the AM server.
See also, "AmService".
"authenticationService"
: configuration expression<uri string>,optionalThe name of an AM authentication tree or authentication chain to use for authentication.
Default: AM's default authentication service.
For an example that uses
authenticationService
, see "Authenticate With SSO Through an AM Authentication Tree".For more information about authentication trees and chains, see Authentication Nodes and Trees and Authentication Modules and Chains in AM's Authentication and Single Sign-On Guide.
"realm"
: string, optionalThe AM realm where the user is authenticated.
Default: The realm declared for
amService
."defaultLogoutLandingPage"
: configuration expression<url>, optionalThe URL to which a request is redirected if
logoutExpression
is evaluated as true.If this property is not an absolute URL, the request is redirected to the IG domain name.
This parameter is effective only when
logoutExpression
is specified.Default: None, processing continues.
"loginEndpoint"
: runtime expression<url>, optionalThe URL of a service instance for the following tasks:
Manage authentication and the location to which the request is redirected after authentication.
Process policy advices after an AM policy decision denies a request with supported advices. The PolicyEnforcementFilter redirects the request to this URL, with information about how to meet the conditions in the advices.
For examples of different advice types, and the conditions that cause AM to return advices, see AM's Authorization Guide. For information about supported advice types in IG, see "Using Advices From Policy Decisions".
Default: The value of
url
inamService
Authentication can be performed in the following ways:
Directly through AM, with optional authentication parameters in the query string, such as
service
,module
, andrealm
. For a list of authentication parameters that you can include in the query string, see Authenticating (Browser) in AM's Authentication and Single Sign-On Guide.The value must include a redirect with a
goto
parameter.The following example uses AM as the authentication service, and includes the
service
authentication parameter:"loginEndpoint": "https://openam.example.com/openam? service=TwoFactor&goto=${urlEncodeQueryParameterNameOrValue(contexts.router.originalUri)}"
Through the URL of another application, with optional authentication parameters in the query string, such as
service
,module
, andrealm
. The application must create a session with an AM instance to set an SSO token and return the request to the redirect location.The value can optionally include a redirect with a
goto
parameter or different parameter name.The following example uses an authentication service that is not AM, and includes a redirect parameter:
"loginEndpoint": "https://authservice.example.com/auth? redirect=${urlEncodeQueryParameterNameOrValue(contexts.router.originalUri)}"
When using this option, review the cookie domains to make sure that cookies set by the authentication server are properly conveyed to the IG instance.
"logoutExpression"
runtime expression<boolean>, optionalAn expression to define a condition for logout, based on the request. If the expression evaluates to
true
, the AM session token for the end user is revoked.If a
defaultLogoutLandingPage
is specified, the request is redirected to that page. Otherwise, the request continues to be processed.The following example expressions can be used to trigger revocation of the end user token:
The request URI contains
/logout
:${matches(request.uri, '/logout')}
The request path starts with
/logout
:${matches(request.uri.path, '^/logout')}
The request query includes the
logOff=true
query parameter:${matches(request.uri.query, 'logOff=true')}
Default: Logout is not managed by this filter.