Configure the Validation and Use of Native OpenEdge SSO Token in Client Requests
- Last Updated: August 19, 2021
- 1 minute read
- OpenEdge
- Version 12.2
- Documentation
Configure the Validation and Use of Native OpenEdge SSO Token in Client Requests
The following table is a list of properties in oeablSecurity.properties that control if and how OE SSO tokens can be used to gain access to the data services.
| PropertyName | DataType | Default | Value Range | Description |
|---|---|---|---|---|
OESSO.error.detail |
integer | 0 |
0 (none) 1 (terse) 2 (debug) |
Controls the amount of error detail returned to a client for all SSO
operations. The default (0) meets security best practices in
returning little of value a hacker can make use of. But it does not
supply an administrator or end-user with useful information for
problem solving. Higher levels provide more information to
administrators for problem resolution, but can also provide
information usable by a hacker to attack your application. This property is used to
set |
OESSO.require.https |
boolean | true |
true|false |
When This property is used to set the property |
OESSOFilter.authPolicy |
string | disabled | — | See the following section, OE SSO Token Consumer Policies. |
OESSOFilter.authmanager |
string | string | — | Control which Authentication Manager is used to
validate the OECP SSO token passed by the HTTP client. This property
is mapped to the http.all.authmanager property and should only be
changed when the OECP SSO Authentication-Manager must be different
than the one used in the OECP SSO provider.See
the |
OESSOFilter.authScheme |
string | OECP | valid string |
The HTTP Authorization header's authentication scheme field name that identifies the presence of an OECP SSO token value CAUTION: OpenEdge recommends that you
do not change this value.
Format: |
OESSOFilter.authClientType |
string | * | regex |
Adds the ability to require the HTTP request's
User-Agent: header to contain a specific value as defined by a
Java RegEx pattern. The default |
OESSOFilter.authErrorDetail |
int | --- | --- |
Mapped to the property |
OESSOFilter.authSecurity |
boolean | --- | --- |
Mapped to the property |
OESSOTokenManager.ssoAllowScope |
string | |
blank or list |
When non-blank this property is used to control
which OE SSO tokens may be used by this web application. If the
OE SSO token passed by a client does has not been granted one of
the scope values in this list, the token is rejected and the
request fails. See the OE SSO token provider property |
OE SSO Token Consumer Policies
| Policy Name | Description |
|---|---|
disabled |
The web application will not look for, or handle OE SSO tokens. If a native SSO token is passed in an Authorization header by a client it will be ignored |
sufficient |
The web application will look for an HTTP
Authorization header containing an authentication-scheme
specified by the
If a validation error occurs, a 401 error will be returned to the client and no other SSO filters will be invoked. If validation is successful the native token will be extracted, the remaining authentication filters will be skipped, and the native token’s ROLEs will be used to perform URL authorization. This policy is best used in the OE SSO token producer and OE SSO token consumer web applications that also support other forms of Spring Security direct-logins to user accounts. |
required |
The web application will look for an HTTP
Authorization header containing an authentication-scheme
specified by the A 401 error response will be returned to the client and no other SSO filters will be invoked if any of the following conditions fail:
If successful the native token will be extracted, the remaining authentication filters will be skipped, and the native token’s ROLEs will be used to perform URL authorization. This policy is best used in the OE SSO token consumer web applications that do not support any other forms of Spring Security direct-login to user accounts. |