Networking and Authentication Guide

     Previous  Next    Open TOC in new window  Open Index in new window  View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

Authentication and SSO

This chapter describes the various authentication options for an AquaLogic User Interaction deployment.

By default, AquaLogic User Interaction performs authentication using credentials stored in the AquaLogic Interaction Portal database. Beyond basic portal authentication, AquaLogic User Interaction can delegate authentication to other backend systems, such as:

Access control lists allow permissions to be granted to users and groups, and user and group properties can be pulled from backend services and mapped to portal users and groups. For details, see Access Control Lists and Profile Sources.

Authenticated users can have their credential information brokered to other backend services, allowing a single login to the portal to enable access to various systems. For details, see Brokering Credentials.

 


Delegating Authentication

The portal can be configured to delegate authentication to various other systems, including remote authentication tiers such as LDAP servers and Active Directory, SSO providers such as Oblix or Netegrity, and Windows Integrated Authentication (WIA). The following sections describe delegating authentication to these systems.

Delegating to a Remote Authentication Tier

Authentication can be delegated to a remote authentication tier by implementing an AquaLogic Interaction authentication service. The authentication service serves two roles: synchronization and authentication.

Synchronization against a backend authentication source imports users and groups into the AquaLogic Interaction portal database. This must be done before the portal user can authenticate against the backend authentication source. Passwords are not imported. This allows portal object permissions to be mapped to external users and groups, while maintaining authentication solely by the backend authentication source.

Authentication allows the portal to query a backend authentication source using a user’s credentials. The sequence of events in the process is as follows:

  1. The user browses to the main portal page and is presented the login screen. User enters credentials.
  2. AquaLogic Interaction sends a request to the backend authentication source using the configured AquaLogic Interaction authentication service.
  3. The backend authentication source returns validity of user credentials.
  4. If the user is authenticated, access to their profile in the portal is granted. If the user is not authenticated, they are presented with the login screen.
  5. AquaLogic Interaction stores credentials in memory, and the user is identified by a browser cookie, if configured to do so. This allows the the user to be logged in automatically next time he visits the portal.

AquaLogic Interaction includes pre-made authentication services supporting LDAP and Active Directory backend systems. In addition, you can develop custom authentication services to authenticate against any backend system.

Additional resources

Delegating to an SSO Provider

Delegating authentication to an SSO provider can circumvent the AquaLogic Interaction login screen and present the user with the login method of the SSO provider. This allows authentication by non-Web form mechanisms, such as keycards or biometric authentication.

The sequence of events of this process as follows:

  1. The user browses to the main portal page address.
  2. The portal forwards this request to the SSO provider.
  3. The SSO provider determines whether the user is already authenticated or needs to be authenticated. This might be done by checking the user’s browser cookies or by another method.
  4. If the user is not authenticated, the SSO provider does what is necessary to gather credentials and authenticate the user.
  5. The SSO provider returns the user to the portal and instructs AquaLogic Interaction to grant the user access to his profile.

Additional resources

Delegating to Windows Integrated Authentication

Delegating to Windows Integrated Authentication (WIA) is similar to delegating to an SSO source. With WIA, the user’s credentials are the same as their Windows network credentials. When the user browses to the portal page, the portal uses Windows to authenticate the user.

Prior to authenticating with WIA, user information must be crawled into the portal database using an Active Directory authentication source.

The sequence of events in the WIA authentication process is as follows:

  1. The user logged into a Windows network browses to the main portal page.
  2. The Portal returns a 401 Unauthorized message to the user browser.
  3. The browser and portal perform the WIA handshake to validate the user.
  4. The portal accepts the authentication and grants access to the user’s profile.

For WIA to work, the user must be logged into a Windows network and be using a browser, such as Internet Explorer, that supports the WIA handshake. WIA will fail over an HTTP proxy.

Additional resources

 


Access Control Lists and Profile Sources

Access Control Lists (ACLs) allow users and groups to be granted permission to use and modify objects in the portal. Portal users who authenticate with any of the methods described in the section Delegating Authentication can be identified within the portal database and added to object ACLs.

A profile service uses an authentication service to pull user properties from backend systems such as LDAP services. Properties in the backend system are mapped to AquaLogic Interaction portal properties and synchronized with the authentication service.

Additional Resources

 


Brokering Credentials

The credentials of a logged in user can be made available to other systems being accessed via the AquaLogic Interaction portal. This allows applications in the portal to display information from systems such as email or other enterprise applications without requiring for the user to log into each of these systems separately.

There are various ways AquaLogic Interaction can pass credentials to backend systems:

Additional resources


  Back to Top       Previous  Next