On Tue, Aug 15, 2017 at 1:22 PM, Johann Nallathamby <joh...@wso2.com> wrote:

>
>
> On Mon, Aug 14, 2017 at 11:56 PM, Malithi Edirisinghe <malit...@wso2.com>
> wrote:
>
>>
>>
>> On Mon, Aug 14, 2017 at 10:27 PM, Harsha Thirimanna <hars...@wso2.com>
>> wrote:
>>
>>>
>>>
>>> On Mon, Aug 14, 2017 at 6:37 PM, Piraveena Paralogarajah <
>>> pirave...@wso2.com> wrote:
>>>
>>>> Hi Maninda,
>>>>
>>>> In OpenID Connect, there are three ways for SLO.
>>>>
>>>>    1. OIDC Session management (see spec
>>>>    <http://openid.net/specs/openid-connect-session-1_0.html>)
>>>>    2. OIDC Front-channel logout (see spec
>>>>    <http://openid.net/specs/openid-connect-frontchannel-1_0.html>)
>>>>    3. OIDC Back-channel logout (see spec
>>>>    <http://openid.net/specs/openid-connect-backchannel-1_0.html>)
>>>>
>>>> In federated authentication, WSO2-IS will act as an RP and also it will
>>>> act as an OP to the downstream RPs and  logout the  the downstream
>>>> logged-in sessions. You can refer these specifications.
>>>> But Facebook is not an OpenID provider. It uses its own OpenID-like
>>>> system called Facebook connect. You can refer this stackoverflow
>>>> question [1]
>>>> <https://stackoverflow.com/questions/1827997/is-facebook-an-openid-provider>
>>>>
>>>>
>>>> Regards,
>>>> Piraveena
>>>>
>>>> *Piraveena Paralogarajah*
>>>> Intern- Software Engineering | WSO2
>>>> *Email *: pirave...@wso2.com
>>>> *Mobile* : +94776099594 <+94%2077%20609%209594>
>>>> <http://wso2.com/signature>
>>>>
>>>> On Mon, Aug 14, 2017 at 5:37 PM, Maninda Edirisooriya <mani...@wso2.com
>>>> > wrote:
>>>>
>>>>> Hi Sugirjan,
>>>>>
>>>>> How the SLO works with sessions logged in with federated
>>>>> authentication? For example if a user has logged in with Facebook
>>>>> authentication how that user be logged out from the Authentication
>>>>> framework when the user is logged out from Facebook? Does OIDC has some
>>>>> spec to notify the WSO2 IDP that the Facebook was logged out?
>>>>>
>>>>> Thanks.
>>>>>
>>>>>
>>>>> *Maninda Edirisooriya*
>>>>> Senior Software Engineer
>>>>>
>>>>> *WSO2, Inc.*lean.enterprise.middleware.
>>>>>
>>>>> *Blog* : http://maninda.blogspot.com/
>>>>> *E-mail* : mani...@wso2.com
>>>>> *Skype* : @manindae
>>>>> *Twitter* : @maninda
>>>>>
>>>>> On Thu, Aug 10, 2017 at 5:53 PM, Sugirjan Ragunaathan <
>>>>> sugir...@wso2.com> wrote:
>>>>>
>>>>>> Hi Kasun,
>>>>>>
>>>>>> On Thu, Aug 10, 2017 at 12:11 PM, KasunG Gajasinghe <kas...@wso2.com>
>>>>>> wrote:
>>>>>>
>>>>>>>
>>>>>>> Can you list possible customer usecases on why they want to use this?
>>>>>>>
>>>>>>
>>>>>> The main usecases are
>>>>>>
>>>>>> 1. If user using multiple applications which supports different
>>>>>> authentication protocols on same browser session and user gets logout 
>>>>>> from
>>>>>> one application, then he will be automatically logged out from all other
>>>>>> applications. For example if user user use SAML based application and 
>>>>>> OIDC
>>>>>> based Application on same browser session and if he logs out from SAML
>>>>>> based application then automatically he will be logged out from OIDC 
>>>>>> based
>>>>>> application.
>>>>>> Currently Identity Server supports only for Cross protocol Single
>>>>>> Login only.
>>>>>>
>>>>>> 2. If user administrator wants to logout from all the applications
>>>>>> which are emerged with Identity Server on same browser session, he can do
>>>>>> force logout from all those applications without regard to authentication
>>>>>> protocols that are supported. For example if any security breaches is
>>>>>> happened and admin user want to logout from all the applications he can
>>>>>> initiate a force logout request for them.
>>>>>>
>>>>>>
>>>>>> On Thu, Aug 10, 2017 at 11:47 AM, Sugirjan Ragunaathan <
>>>>>> sugir...@wso2.com> wrote:
>>>>>>
>>>>>>> Hi,
>>>>>>>
>>>>>>> Currently I’m working on a project 'Cross protocol single logout'.
>>>>>>> WSO2 Identity Server provides Single LogOut over applications,
>>>>>>> participating on the same session over the same authentication protocol 
>>>>>>> and
>>>>>>> Single SignOn over the different protocols.
>>>>>>>
>>>>>>> [image: 1.png]
>>>>>>>
>>>>>>> Objective:
>>>>>>>
>>>>>>> Design and provide a solution to support cross protocol SLO
>>>>>>>
>>>>>>> Problem :
>>>>>>>
>>>>>>> WSO2 Identity Server supports multiple applications which are using
>>>>>>> different authentication protocols. It does not provide cross protocol
>>>>>>> Single Logout. For example, Assume that  you are using SAML based
>>>>>>> application and OIDC based application is same browser session. when you
>>>>>>> logout from a SAML based application it will only log you out from other
>>>>>>> SAML applications not from OIDC based application with the same session.
>>>>>>>
>>>>>>> Solution:
>>>>>>>
>>>>>>> The proposed solution for this problem is implementing a common
>>>>>>> event handler over different protocols. When a session is terminated
>>>>>>> because of user logout, an event should be published to invoke the ‘SLO
>>>>>>>  Event Handler’.So 'SLO Event Handler' notifies all the inbound
>>>>>>> authenticators and the authenticators handle respective logout actions. 
>>>>>>> In
>>>>>>> order to listen the logout event, all the respective authenticators 
>>>>>>> have to
>>>>>>> be subscribed in the ‘SLO event handler’ and have own separate event
>>>>>>> handlers to trigger the logout for their registered applications.
>>>>>>>
>>>>>>> [image: SolutionArchi.png]
>>>>>>>
>>>>>>>
>>>>>>> We would like to have your feedback and suggestions in this regard.
>>>>>>>
>>>>>>
>>>
>>> +1 for this approach and while triggering this subscribed events, shall
>>> we have a API to call to send SLO request, because it may be useful like,
>>> when we disable a user from admin console or using API, we can trigger that
>>> SLO API for that user and terminate both IS session and the client sessions
>>> as well.
>>>
>>
>> Yes we can expose an API such that the implementation will be another
>> event publisher
>>
>>
>>> And how do we handle this SLO with a federated IDP as well.
>>>
>>> ex: SP1 -> inbound OIDC and IDP resident.
>>>       SP2 -> inbound OIDC and IDP federated.
>>>
>>> If SP1 client send logout request, then SP1 and SP2 client will get
>>> logout request because of this subscription model. Don't we need to send
>>> logout to federated IDP of SP2  as well ?
>>>
>>
>> I don't think so. Because, if we take login, logged into the resident IdP
>> does not mean that you are also logged into the federated IdP as well. So
>> if you try to login to SP2 in above case, you will get the login page from
>> the federated IdP. So, should it be that logging out from the resident IdP
>> only, should log out the user from the federated IdP as well. Which is the
>> case you have mentioned above. I think, we should notify only the session
>> participants of the current IdP session.
>>
>
> But this is how our current model with SAML2 works right? If we logout
> from IS as Resident IDP, all the federated login sessions also get cleared
> out. So we can't follow two models for SAML2 and OIDC. Am I missing
> something? I am open to discuss if this model is right or not, probably
> give the option to the user, but we need to be consistent.
>
>
​I also believe that we must ​clear out the federated session and I had a
discussion with Malithi as well.

Without having that , this SLO may be not complete for some deployment. So
we can't tell that we support SLO all the time.

But +1 to improve that after this initial development task.




> Regards,
> Johann.
>
>
>>
>>
>>>
>>>
>>>>
>>>>>>> Thanks.
>>>>>>>
>>>>>>> Regards,
>>>>>>> *R. Sugirjan*
>>>>>>> Software Engineering - Intern | WSO2
>>>>>>>
>>>>>>> Email:  sugir...@wso2.com
>>>>>>> Mobile: +94768489892 <076%20848%209892>
>>>>>>> <http://wso2.com/signature>
>>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> --
>>>>>>
>>>>>> *Kasun Gajasinghe*Associate Technical Lead, WSO2 Inc.
>>>>>> email: kasung AT spamfree wso2.com
>>>>>> linked-in: http://lk.linkedin.com/in/gajasinghe
>>>>>> blog: http://kasunbg.org
>>>>>> phone: +1 650-745-4499 <(650)%20745-4499>, 77 678 0813
>>>>>>
>>>>>>
>>>>>> Thanks.
>>>>>>
>>>>>> Regards,
>>>>>> *R. Sugirjan*
>>>>>> Software Engineering - Intern | WSO2
>>>>>>
>>>>>> Email:  sugir...@wso2.com
>>>>>> Mobile: +94768489892 <076%20848%209892>
>>>>>> <http://wso2.com/signature>
>>>>>>
>>>>>> _______________________________________________
>>>>>> Architecture mailing list
>>>>>> Architecture@wso2.org
>>>>>> https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
>>>>>>
>>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> Architecture mailing list
>>>>> Architecture@wso2.org
>>>>> https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
>>>>>
>>>>>
>>>>
>>>
>>
>>
>> --
>>
>> *Malithi Edirisinghe*
>> Associate Technical Lead
>> WSO2 Inc.
>>
>> Mobile : +94 (0) 718176807
>> malit...@wso2.com
>>
>
>
>
> --
> Thanks & Regards,
>
> *Johann Dilantha Nallathamby*
> Senior Lead Solutions Engineer
> WSO2, Inc.
> lean.enterprise.middleware
>
> Mobile - *+94777776950*
> Blog - *http://nallaa.wordpress.com <http://nallaa.wordpress.com>*
>
_______________________________________________
Architecture mailing list
Architecture@wso2.org
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to