80 likes | 201 Vues
This case study explores the implementation of Single Sign-On (SSO) mechanisms at Salesforce.com, primarily focusing on usability, security, and scalability. Key considerations include seamless integration without impacting functionality, compliance with security standards, and the non-storage of user credentials in applications. The use of Delegated Authentication (DA) and SAML technologies is emphasized, providing an overview of their roles in enabling SSO for disparate systems. We discuss browser-based authentication, the OAuth standard, and real-world application supporting over 20,000 users for two years.
E N D
SSO Case Study Suchin Rengan Principal Technical Architect Salesforce.com
The Scenario Mobile Outlook Browser
Key Considerations • Must be Seamless • No Impacts to the intended Functionality • Focus on Usability • Comply with Security Standards • User credentials cannot be stored in any applications • Reusability wherever possible • Allow for Scalability
SSO Mechanisms • DA • SF Legacy way to accomplish SSO • Customers have to build a Web Service that will authenticate requests that are delegated by SF • User Profiles need to be enabled for SSO • Delegated Authentication configuration to point to the Delegated Authentication Web Service hosted by the customer • SAML • SAML is a technology that enables SSO between two disparate systems (Web and Desktop) • SF supports SAML 1.1 and SAML 2.0 • Support since Summer ’08 • Supports browser post profiles • Cannot be used to accomplish SSO for desktop/ outlook/ mobile clients (DA/ OAuth2 is a better alternative) • OAuth • Open standard for authorization (OAuth!) • Stop the password anti-pattern • Explicit grant of permission by user • The Valet key concept • Credential is per-service-provider • Revokable without changing password • Browser based authentication for rich clients • Make it possible to participate in SSO
The Browser Scenario 1. User Request 2. Validate and Generate SAML Token Browser Identity Provider (Corporate Portal) 4. User Session 3. Post SAML
The Outlook Scenario Outlook User Credentials (context based) Identity Provider Intermediary Service SAML Token SAML Token (Login API) User Session DA Service DA Redirect True/ False
The Mobile Scenario Mobile NT Authentication Services NT Login Credentials User Session DA Redirect DA Service True/ False
Summary • Been in production for 2 years • Supports 20 K users