Skip Headers
Oracle® Identity and Access Management Introduction
10g (10.1.4.0.1)

Part Number B31291-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

8 OracleAS Single Sign-On

Oracle Application Server (OracleAS) Single Sign-On enables you to use a single user name, password, and optionally a realm ID to log in to all features of OracleAS as well as to other Web applications.

Oracle components delegate the login function to the OracleAS Single Sign-On server. When a user first logs into an Oracle component, the component redirects the login to the OracleAS Single Sign-On server. The OracleAS Single Sign-On server authenticates the user by verifying the credentials entered by the user against those stored in Oracle Internet Directory. After authenticating the user, and throughout the rest of the session, the OracleAS Single Sign-On server grants the user access to all the components the user both seeks and is authorized to use.


See Also:

Oracle Application Server Single Sign-On Administrator's Guide for information about OracleAS Single Sign-On.

This chapter contains the following topics:

8.1 Benefits of Oracle Application Server Single Sign-On

OracleAS Single Sign-On provides the following benefits:

8.2 Features of Oracle Application Server Single Sign-On

Oracle Application Server Single Sign-On provides the following features:

8.3 How OracleAS Single Sign-On Works

This section contains the following topics:

8.3.1 Components of the Single Sign-On System

OracleAS Single Sign-On interacts with several components. They include:

  • Single Sign-On Server—The single sign-on server consists of program logic that enables users to log in securely to single sign-on applications such as expense reports, mail, and benefits. The single sign-on server program logic resides in the Oracle Application Server database, Oracle HTTP Server, and OC4J server.

  • Partner Application—an Oracle Application Server application or non-Oracle application that delegates the authentication function to the OracleAS Single Sign-On server. This type of application spares users from reauthenticating by accepting headers from an authentication module named mod_osso. Examples of partner applications include OracleAS Portal, OracleAS Discoverer, and Oracle Delegated Administration Services.

  • External Application—a non-Oracle application that displays an HTML login forms that ask for application user names and passwords. At the first login, a user can select the Remember My Login Information For This Application check box. On subsequent logins, the server uses the single sign-on user name to locate and retrieve application names and passwords and to log the user in without requiring the user to authenticate.

  • mod_osso—an Oracle HTTP Server module that provides authentication to OracleAS applications. Mod_osso works only with the Oracle HTTP listener. You can use OracleAS SSO Plug-in to protect applications that work with third-party listeners such as Sun One and IIS.


    See Also:

    Oracle Identity Management Application Developer's Guide for more information about mod_osso.

  • Oracle Internet Directory—the repository for all single sign-on user accounts and passwords, both administrative and nonadministrative. The single sign-on server authenticates users against their entries in the directory. At the same time, it retrieves user attributes from the directory that enable applications to validate users.

8.3.2 Accessing the Single Sign-On Server

Nonadministrative users first gain access to the single sign-on server by entering the URL of a partner application such as OracleAS Portal. Entering such a URL invokes the single sign-on login screen. Once they have entered the correct user name and password, users gain access to other partner applications and to external applications without having to provide credentials again.

Administrative users can access the administration home page for single sign-on by typing a URL of this form:

http://host:port/sso

where host is the computer where the single sign-on server is located and port is the port number of the server. If the server is enabled for SSL, https must be substituted for http. If the port number is 80 or 443 (SSL), it may be omitted from the URL. These numbers are the defaults.

8.3.3 Accessing a Partner Application

Figure 8-1 shows what happens when the user requests the URL of a partner application that is protected by mod_osso. This illustration shows the single sign-on server and the partner application server residing on separate computers, one placed above the other. To the left of the partner application server is the browser. Attached to the single sign-on server is a box that represents Oracle Internet Directory. Arrows show the browser requesting an application, being redirected to the single sign-on server, and, finally, being redirected back to the partner application.

Figure 8-1 Single Sign-On with mod_osso

Graphic of a process. A text description follows.
  1. The user tries to access a partner application.

  2. The user is redirected to the single sign-on server. The server challenges the user for credentials. After verifying the credentials in Oracle Internet Directory, the server sets the SSO session cookie and passes an authentication token to the partner application.

  3. The application serves up the requested content.

8.3.3.1 Authenticating to a Partner Application After the First Time

Requesting access to a partner application initiates the partner application login process. The following occurs if you are accessing a new partner application after having already logged in to the Single Sign-On server:

  1. The user tries to access a partner application.

  2. The user is redirected to the single sign-on server. The server does not challenge the user for authentication credentials. The SSO session cookie is used to validate the user identity.

  3. The server passes an authentication token to the partner application.

  4. The application serves the requested content.

8.3.3.2 Logging Out of an Partner Application

Unlike external applications, partner applications cede logout control to the single sign-on server. When the user logs out of one partner application, he or she is automatically logged out of the other partner applications.

8.3.4 Accessing an External Application

External applications are available through OracleAS Portal, a single sign-on partner application.

This section contains these topics:

8.3.4.1 Accessing the External Applications Portlet in OracleAS Portal

To gain access to an external application, you select the External Applications portlet on the OracleAS Portal home page; then, from the list of external applications that appears, you select an application.

8.3.4.2 Authenticating to an External Application for the First Time

Selecting an application in the External Applications portlet initiates the external application login procedure. The following occurs if you are accessing the application for the first time:

  1. The external application login procedure checks the single sign-on password store for your credentials. If it finds no credentials, the single sign-on server prompts you for them.

  2. You enter your user name and password. You can save these credentials in the password store by selecting the Remember My Login Information check box on the application login screen.

  3. If you elect to save your credentials in the password store, the server uses these credentials to construct a login form to submit to the login processing routine of the application. This routine has been preconfigured by the administrator and is associated with the requested application.

  4. The server sends the form to the client browser, with a directive to post it immediately to the external application.

  5. The client posts the form to the external application and logs you in.

If you decline to save your credentials in the password store, you must enter a user name and password each time that you log in.

8.3.4.3 Authenticating to an External Application After the First Time

If you saved your credentials when accessing an external application for the first time, the single sign-on server retrieves your credentials for you during subsequent logins. The process works like this:

  1. You click one of the links in the External Applications portlet of OracleAS Portal.

  2. The external application login procedure checks the password store for your credentials.

  3. The single sign-on server finds your credentials and uses them to construct a login form to submit to the login processing routine of the application. This routine has been preconfigured by the administrator and is associated with the requested application.

  4. The server sends the form to the client browser, with a directive to post it immediately to the external application.

  5. The client posts the form to the external application and logs you in.

8.3.4.4 Logging Out of an External Application

Unlike partner applications, external applications do not cede logout control to the single sign-on server. It is the user's responsibility to log out of each of these applications.