169
Views
2
Comments
Windows Integrated authentication - Reactive web

Hi All,

We are trying to achieve the functionality of single sign-on using windows integrated authentication for reactive application.

Since we don’t have direct support for it in OutSystems Reactive web apps. We have done the following steps

Configuration changes: 

(Applications Authentication)

1. enabled Single Sign-On between App Types in service center.

(Environment Security)

2. Enabled HTTP Strict Transport Security (HSTS)

3.Force HTTPS for screens in Web Applications


Workaround

Created a Traditional Web App (App B) to do the windows integrated authentication by redirecting the request from the reactive app and back to it.

Actual Application Reactive web App (App A)

Authentication Application - Traditional web App  (App B)


The above setup works well in our dev region.


However, we have issue in the Quality environment as we have 2 deployment zones there . (Internal and External).

The external zone is restricted, and apps deployed there can be accessed only via WAF.(Our  application (App A) , the reactive one is deployed in this zone).


Due to this restriction we had to deploy the Authentication Application (App B) on the internal zone.


and by this  we are not able to get the single sign-on to work a we are unable to pass the authentication session between 2 deployment zones.


I would appreciate any suggestions on how we can solve this issue/ how to share the session across  zones?

Please  let me know.


2021-10-09 07-57-44
Stefan Weber
 
MVP

Hi,

An alternative to the Traditional Web workaround is to use an external Identity Provider like Active Directory Federation Service and configure the OutSystems Users provider to use that. ADFS is supporting Integrated Windows Authentication (of course the ADFS endpoint must be a member of the Windows Domain). So a user of an OutSystems Application gets redirected to ADFS which performs the login and sends the SAML assertion back to OutSystems where the actual User login is performed. The user will be redirected two times, first to the ADFS and then back to the redirect url (the application the user tried to access).

Best

Stefan

2023-12-28 17-18-31
Praveen Kumar Natarajan
 
MVP

@Stefan Weber  - thank you for the details. I will try this option. 

Community GuidelinesBe kind and respectful, give credit to the original source of content, and search for duplicates before posting.