cosign wiki:SSO Scheme

From cosign wiki

(Difference between revisions)
Jump to: navigation, search
(8Lrw2D, http://payday-loansonline.net inside the payday-loansonline.net, 443,)
Current revision (10:52, 24 November 2014) (edit) (undo)
 
Line 12: Line 12:
When the user's browser returns to the application, the filter again checks for and locates a valid service cookie. The filter then populates the environment with the user’s authentication information and permits access to the application.
When the user's browser returns to the application, the filter again checks for and locates a valid service cookie. The filter then populates the environment with the user’s authentication information and permits access to the application.
-
 
-
8Lrw2D, http://payday-loansonline.net inside the payday-loansonline.net,  443,
 

Current revision

[edit] Introduction

This series of pages presents the overall design scheme of Cosign, an open source, single sign-on, web package. It describes the functionality of the three major parts of Cosign: the filter, the CGIs, and the daemons. Also described are Cosign's supporting components, including cookie values, the query string protocol, template structure, local cookie cache file formats, and the SMTP-like, SSL-encrypted Cosign Protocol, which the filters and CGIs use to communicate with the daemon.

These pages are based on the document The Cosign Web Single Sign-On Scheme, June 2006, Draft 4, by Craig, Craig, McGowan, and Malestein, with assistance from Cory Snavely.

[edit] Authentication Sequence (Overview)

The process begins when the user accesses an area on the web server for which the filter is configured to require authentication. The filter checks for the presence of a valid service cookie, and if one is not present, it sets a new one and redirects the user's browser to the Cosign CGI, including the service cookie and a return URL in the query string.

The Cosign CGI, in turn, checks for the presence of a valid login cookie. If present, the CGI registers the new service cookie with the existing login cookie, and redirects the user's browser back to the return URL; this is single sign-on in action, permitting authentication to multiple applications and resources without additional password prompting. If the login cookie is not present, however, the Cosign CGI presents an authentication form, and upon successful authentication, creates the login cookie, registers the service cookie with it, and redirects the user's browser to the return URL.

When the user's browser returns to the application, the filter again checks for and locates a valid service cookie. The filter then populates the environment with the user’s authentication information and permits access to the application.

Personal tools