WFM and Identity Provider (IdP) initiated Single Sign-On (SSO)
WFM supports Identity Provider (IdP) initiated Single Sign-On (SSO)
using an alternate login JSP that will support configurable redirect and an
implementation of
WebSignOnInterface
. This approach assumes all
communication between the WFM and the IdP is through browser redirects.
This high-level diagram shows all the steps that are involved when an unauthenticated user accesses WFM:
- The user specifies the root
URL or
login.jsp and is forwarded to the
loginRedirect.jsp. You must specify these URLs or
the redirect will not work.
For example, you can specify:
- http://myurl.mydomain.com:8011
- http://myurl.mydomain.com:8011/login.jsp
- The
loginRedirect.jsp responds to the browser with a
redirect command based on the URI that is stored in the LOGIN_REDIRECT_URL
registry parameter, for example:
https://localhost:9443/samlsso?spEntityID=workbrain
- The browser redirects to the specified URL.
- The IdP displays a login page.
- The user authenticates.
- The IdP responds with a redirect to WFM's menu.jsp with the SAML token in a HTTP parameter.
- The browser redirects to menu.jsp with the SAML token in a HTTP parameter.
At this point, the standard WFM authentication framework calls a SAML
IdpInitiatedSSO
adapter that implements
WebSignOnInterface
. The adapter parses and validates the
SAML token that was passed as a HTTP parameter.
Note:
- When using Identity Provider initiated SSO, WFM only processes the nameID element from the SAML Response. The nameID value must match a user name from WBU_NAME and the nameID element must be inside the Subject element. No claims are processed.
- WFM does not provide a URL to import the metadata for configuring the IdP. All configuration values must be entered manually in to the IdP.