...
Front-end - Back-end interaction:
Logic-flow:
- The client sends POST request with AD credentials to the "/web/Login/Login.html" access-point on the PASOE (swat-backend).
- PASOE forwards AD credentials to NodeJS (node-main).
- NodeJS handles AD authentication, using passport with passport-ldapauth strategy. Then responds with ssoSessionId & ssoUserId, if authentication successful.
- PASOES passes back to Client the ssoSessionId & ssoUserId.
- Client logins into PASOE with ssoUserId & ssoSessionId.
- PASOE handles login using HybridRealm with ISwatAuthenticationService by checking if the ssoSessionId & ssoUserId is valid in nodeJs.
- Client is authenticated.
...
Note: node-main is hidden behind PASOE server from the client's perspective.
In order to use ActiveDirectory authentication, the following configuration settings must be present in pasoe-config.xml / OEPAS_config.xml:
...
Code Block | ||||
---|---|---|---|---|
| ||||
<AllowedAuthentication>ActiveDirectory</AllowedAuthentication> <ssoAuthenticationURI>http://localhost:8888/auth/ad/login</ssoAuthenticationURI> <ssoAuthenticationCheckURI>http://localhost:8888/auth/ad/sessions</ssoAuthenticationCheckURI> <ssoAuthenticationSecretKey>12345678901</ssoAuthenticationSecretKey><!-- OPTIONAL --> |
Note: node-main is hidden behind PASOE server from the client's perspective.
AzureActiveDirectory
TBD by Sergiu Morar / Sebastian Lucaciu
...