Configure the Generation of OpenEdge Native SSO Tokens
- Last Updated: August 19, 2021
- 1 minute read
- OpenEdge
- Version 12.2
- Documentation
Only certain types of PAS for OpenEdge web application may be a source of native SSO tokens. External authentication systems that produce their own security tokens and are integrated into Spring Security’s process are prohibited from having an SSO token generated by OpenEdge.
The generation of an OpenEdge native SSO token occurs after Spring Security’s authentication process completes a successful user direct-login. This post processing operation generates an extended ClientPrincipal security token that is safe enough to function in a less secure client login context environment (where a client receives and exposes a security token to the network world). This processing is handled by the existing OE authentication success handling, which uses the OpenEdge Client-Principal handler to do the physical Client-Principal generation and sealing. The OpenEdge successful authentication handler has the following configuration properties for producing OpenEdge SSO tokens, and adds some optional properties to allow tailoring to individual installations:
The following table is a list of properties in oeablSecurity.properties that control OE token generation properties.
| Property Name | Data Type | Default | Value Range | Description |
|---|---|---|---|---|
OESSO.require.https |
boolean | true |
true | false |
When true, controls
the requirement for all SSO operations to require a client request to be
made using the HTTPS URL scheme. Set to This
property is used to set the |
OESSO.error.detail |
integer | 0 |
0 (none) 1 (terse) 2 (debug) |
Controls the amount of error detail returned to a
client for all SSO operations. The default (0) meets security best
practices in returning little of value a hacker can make use of. But it
does not supply an administrator or end-user with useful information for
problem solving. Higher levels provide more information to
administrators for problem resolution, but can also provide information
usable by a hacker to attack your application. This
property is used to set the |
OESSOTokenManager.tokenPolicy |
string | disabled |
— |
Controls the actions to take when producing and returning a native OE SSO Token to a client. See the following OESSOTokenManager Policies section for more information. |
OESSOTokenManager.tokenURLOption |
string | oesso |
|
The URL query option name used by a client to request
the server issue a OE SSO token if the For example:
A Ignored if the OESSOTokenManager. |
OESSOTokenManager.ssoTokenRefresh |
boolean | true |
true|false |
Controls a client's ability to request that an expired OE SSSO be refreshed with a new expiration date. NOTE: This property's value is forced to |
OESSOTokenManabger.ssoTokenExpires |
integer |
(1 hour) |
|
This property controls the number of seconds a newly created OE SSO token is valid before it expires. If the value is less than 1, no refresh token will be generated and returned |
OESSOTokenManager.ssoGrantScope |
string | "" |
string |
This property can be used to control which OpenEdge web applications may use an OE SSO Token produced by the Token Manager. It is used when an ABL application has many web applications, but not all of them should accept any OE SSO token. The string a comma separated list of names that correspond to web applications that should accept the OE SSO token. When blank, no scope information will be included in the OE SSO token. When Refer to the OE SSO token consumer property |
OEAuthnSuccessHandler.tokenErrorDetail |
integer | 0 |
|
Controls the amount of error detail returned to a client during the OE SSO token creation process. This property is normally set using the |
OEAuthnSuccessHandler.tokenSecure |
boolean | true |
true|false |
Controls the requirement for HTTPS requests from the client while authenticating the user and returning an OE SSO token. This property is normally set using the |
OESSOTokenManager Policies
| Policy Name | Description |
|---|---|
disabled |
The web application will not generate OE SSO tokens. This policy must be used in all web applications that do not support the Spring Security HTTP Form direct-login to user accounts. |
ifRequired |
The web application will only produce an OE SSO token if the client application requests it by using adding a URL option during a successful direct-login operation. For more information refer to the This policy should be used only in OE SSO token producer web applications that support the Spring Security HTTP Form type of direct-login to user accounts |
always |
The web application will always produce a OE SSO token if the client completes a successful direct-login operation. This policy should be used only in OE SSO token producer web applications that support the Spring Security HTTP Form type of direct-login to user account. Note: This is an extremely dangerous policy setting
and should only be used in cases where the web application’s
authentication process is protected by other controls such as
client types, IP addresses, etc.
|