Single Sign-on (SSO) is a session and user authentication process. It allows you to access multiple applications by logging in only once with one set of login credentials.
The SSO feature supports applications using the same identity service.
For example: Application1 and Application2 use a Google Identity Provider. When you sign in to Application1 by using the credentials for the Google Identity Provider, you need not sign in to Application2. You will be automatically signed in to Application2.
To understand the functionality of the SSO feature, consider two applications namely Calendar app and Task app using the same identity provider. The following flow diagram illustrates how SSO feature works on user's device at runtime:
The workflow of these applications is as follows:
To configure SSO in your applications, perform the following tasks:
To enable SSO in Kony Fabric Console, follow these steps:
The client applications are built on Kony Visualizer and they interact with the Kony Fabric server using the Kony Fabric SDK.
Important: Ensure that the Kony Fabric application, which you have configured earlier is associated with your Kony Visualizer project.
To enable SSO on the client application for login call, add the following code in Kony Visualizer:
//Sample code to authenticate to Kony Fabric client var serviceName = "identity_service_name"; var identitySvc = KNYMobileFabric.getIdentityService(serviceName); var options = {}; var loginOptions = {}; options["userid"] = "userid"; options["password"] = "password"; loginOptions["isSSOEnabled"] = true; option["loginOptions"] = loginOptions; identitySvc.login(options, function(response) { kony.print("Login Success: " + JSON.stringify(response)); }, function(error) { kony.print("Login Failure: " + JSON.stringify(error)); });
The SSO tokens are stored in shared space/keychains of the devices. You must configure application settings to ensure that these tokens are shared among all the SSO enabled apps so that the SSO is implemented and other applications can access these tokens.
Permissions in Android Devices
For the SSO feature to work in the Android devices, follow these steps.
Note: The Organization ID must be unique for every organization so that the SSO token is shared amongst a particular organization only.
Repeat the steps for each app that needs SSO capability to be enabled.
To configure permissions for iOS devices, follow these steps:
KONY_SHARED_KEYCHAIN_GROUP
of the string data type. Set the name of the keychain group created in the previous step as value for the new property. For example, KONY_SHARED_KEYCHAIN_GROUP = PM7352S8QE.com.kony.sso
Here, PM7352S8QE
is an Organizational Unit value in the certificate, which can be obtained from the developer certificate.
Important: For all apps that intend to share the same SSO group, the key name string must be the same. The key name string must be different for different SSO groups.
Copyright © 2020 Kony, Inc. All rights reserved. |