Skip to main content

Single Sign On

You can configure single sign-on authentication for your users, enabling them to access the App Portal app store (including the mobile version) on-the-go from locations outside the corporate network or VPN.

Single sign-on is configured on the Site Management > Settings > Single Sign On view.

Site Management > Settings > Single Sign-On View

On the Single Sign-On view, you can specify single sign-on settings for both the standard user interface ( OpenID Connect , OAuth 2.0 , SAML 2.0 , and Custom ) and the mobile user interface ( SAML 2.0 only).

App Portal supports for the following authentication types.

InterfaceAuthentication TypeDescription
Standard User InterfaceNoneWhen single sign-on is not enabled, Windows Authentication is used.
SAML 2.0SAML (Security Assertion Markup Language) 2.0 is an XML-based, open-standard data format for enabling web browser single sign-on.
OAuth 2.0OAuth is an open standard for authorization, commonly used as a way for users to log in to third party websites using their Google, Facebook, Microsoft, Twitter, etc. accounts without exposing their password.
OpenIDOpenID is an open standard and decentralized authentication protocol which allows users to be authenticated by co-operating sites (known as relying parties) using a third-party service.
CustomTo implement a custom single sign-on authentication type, you would need to write a custom SSL page ( \.aspx ) to redirect to. App Portal is installed with a boilerplate custom SSL page named CustomSignon\.aspx , which your services team can customize for your organization.
When using single sign-on, App Portal needs to be configured to run with anonymous authentication in IIS. By default, Windows Authentication is selected.
Mobile User InterfaceNoneWhen single sign-on is not enabled for the mobile user interface, forms authentication is used.
SAML 2.0SAML (Security Assertion Markup Language) 2.0 is an XML-based, open-standard data format for enabling web browser single sign-on.

The Single Sign-On view includes the following properties:

Single Sign-On TypeFieldDescription
SAML 2.0Identity provider certificateClick Browse select the authentication certificate that you obtained from your identity provider platform.
Single sign-on URLEnter the URL that you obtained from your identity provider platform.
Signature node XPathThe default setting is //ds:Signature . Adjust this signature node XPath as needed, per your identity provider platform.
Attribute node XPathThe default setting is below. Adjust this attribute node XPath as needed, per your identity provider platform. /saml2p:Response/saml2:Assertion/saml2:Subject/saml2:NameID
Redirect Url ParameterThe Redirect Url Parameter declaration, which is set by default to RelayState , is optional extra information that may be sent along with a SAML message. This parameter may specify a URL the service provider should redirect to once single sign-on completes.
OpenID ConnectSingle sign-on URLEnter the URL that you obtained from your identity provider platform.
Authentication request end pointEnter the URL that you obtained from your identity provider platform.
Client IDEnter the client ID that you obtained from your identity provider platform.
Redirect URLEnter the following: http://YOURAPPPORTALSERVER/esd/OpenIdSignOn\.aspx
StateEnter any value that will passed back to App Portal by the identity provider platform post login for validation. The State value helps to validate that the correct ID Token is received. Also, this value comes as a Key in the Form element.
NonceEnter any value that will passed back to App Portal by the identity provider platform post login for validation. The Nonce value helps to validate that the correct ID Token is received. Also, it is used to mitigate replay attacks.
Bypass Token ValidationWhen the client application receives the ID Token from the identity provider platform, it is the responsibility of the client to validate the ID Token. This validation process involves a number of steps which would get performed when the Bypass token validation option is not selected. If you want to bypass token validation, select the Bypass token validation option.
Generate “Initiate Login URL”Click to generate a URL based upon the entered information. Copy this URL, return to the account settings page of your identity provider platform and paste this URL into the Initiate login URL field.
OAuth 2.0Client IdEnter the ID provided by your identity provider platform.
Client SecretEnter the “client secret” provided by your identity provider platform.
Authorization end pointEnter URL provided by your identity provider platform.
Call back UrlEnter the following URL: http://<span class="Emphasis">YOURAPPPORTALSERVER</span>/esd/oauth2SignOn.aspx?MethodToInvoke=CallBack
ScopeEnter URL provided by your identity provider platform.
Profile end pointEnter URL provided by your identity provider platform.
Token end pointEnter URL provided by your identity provider platform.
CustomSingle sign-on URLWhen you select this option, the settings defined in your custom SSL page are displayed.

See Also

Configuring Corporate Single Sign On

Configuring SAML 2.0 Authentication

Configuring OAuth 2.0 Authentication

Configuring OpenID Connect Authentication

Configuring Custom Authentication