Single Sign-On with OAuth 2 and OpenID Connect


Many organizations utilize an Identity Provider to manage their user authentication and authorization. The Single Sign-On (SSO) feature leverages a company's existing identity infrastructure to allow authorized users to access resources in SynaMan. Using an Identity Provider is an alternate solution to using LDAP/AD or creating local users in SynaMan.

Benefits of Using SSO

  • Users have to remember fewer passwords
  • Typically, a company portal redirects users to SynaMan's web interface, which streamlines the process of signing and using applications.
  • Organizations can use a single set of policies for authentication, such as two-factor authentication.

Prerequisites

SynaMan can be integrated with any Identity Provider that support OAuth 2 along with OpenID Connect (OIDC). The actual Identity Provider could be on a public cloud or installed within a company's LAN.

Tutorial Videos

In order to get you started quickly, it is recommended you watch the following videos. The first video talks about installing and configuring KeyKloak server, which is an open source Id Server. The second video demonstrate integrating SynaMan with KeyKloak.

Configuration

Following is a step-by-step instructions on how to configure KeyKloak with SynaMan.
  • Download, install and configure KeyKloak server as demonstrated in the first video above. If you're using a different Identity Provider, following the documentation for that to configure it. In short, you MUST perform the following tasks in the Identity Provider before configuring it with SynaMan.
    • Create a ClientID for SynaMan.
    • Create at least two users. Designate of them as the admin account.
    • Note down the metadata URL for the server. Contact the support for the server's if you're using an Identity Server on a public cloud.
  • Log in to SynaMan as 'admin'.
  • Click on the Security tab.
  • Specify the user id for admin. This user MUST be a valid user in the Identity Server. Save the settings. This is a VERY IMPORTANT step. Failure to change the user ID will get you locked out of SynaMan.
  • Click on Single Sign-On tab.
  • Specify the Auth Metadata URL as provided by your identify provider.
  • Specify the ClientID.
  • Client Secret is optional. Only include a client secret if you have configured this client with a secret in your Identity Provider.
  • Check the box to enable SSO.
  • Restart SynaMan

Importing Existing Users

Existing users are imported automatically, provided a user ID exists in the Identity Portal matching the existing user name.

Temporarily Disabling SSO

If you forget to modify the user name for the administrator's account, as mentioned above, the only way to gain access is to temporarily disable SSO. This is done by following the steps below.
  • Connect to the machine where SynaMan is running.
  • Using Windows File Explorer, go to $INSTALL_DIR\config folder. $INSTALL_DIR refers to the folder where SynaMan is installed.
  • Rename OAuthConfig.xml to a different name.
  • Restart SynaMan

Comparing SSO with LDAP/AD and local login

With the introduction of SSO, now there are three different mechanisms to manage user authentications:

  • Local users in SynaMan
  • User credentials that come from an Active Directory/LDAP server
  • SSO, which comes from an Identity Provider supporting OAuth with OpenID Connect. It is important to note that using SSO will automatically disable the first two mechanisms.

Following table mentions some differences in all of these mechanisms.

Features Local Accounts Active Directory SSO
User Scope 100% local to SynaMan. Allowing users outside your organization to have an account. Integrated with your Windows login account. This is typically inside your LAN but could also be on a public cloud. Integrated with other web portals in your company.
Sessions Maintained within SynaMan. User will have to log in again once the session expires. Maintained within SynaMan. User will have to log in again once the session expires. Maintained by the identity server. Users will stay logged for a longer period of time.
Mixing Can be mixed with AD/LDAP. Meaning some users can be local while others come from AD. Can be mixed with local users. Cannot be mixed with other mechanisms. Using SSO will disable the other two.

Navigation

Social Media

Powered by 10MinutesWeb.com