Web Application (Extension based)
  • 05 Nov 2024
  • 7 Minutes to read
  • Dark
    Light
  • PDF

Web Application (Extension based)

  • Dark
    Light
  • PDF

Article summary

Cross identity supports single sign-on to form-based/web-based enterprise or legacy applications. Cross identity has web browser extensions, which perform credentials replay into the application login page. 

Information:

When configuring or writing a script for an application (browser-specific), it should consist of only double quotes.

Configuring Web-Based Application

  1. Navigate to Applications from the menu. Click + Add Application.

  2. In the AppStore pane, click Web to view WEB applications. Example- LinkedIn. 

  3. Once the application is added, you will be redirected to the Application Configuration page.

  4. Specify the following details:

  • Application Name: It is a pre-filled text field. The name can be edited as per requirement.

  • Application Logo: Upload the application logo if you want to change the existing one. It supports PNG & JPEG formats.

  • Application URL: Enter the login URL of the application where credentials need to be entered. 

  • Enable Secure Web Access: Select this option to enable web access management module of CI.

  • Login ElementsSelect the determinants of login elements based on their type and value. Only an administrator can set element types:

    • Set by UserAttribute value set by the user while performing single sign-on to the application first time. 

    • Set by Admin: The attribute value an admin sets will be the same for all the users. (This option is used when all users use the same application service account.) 

    • Directory Attribute: Attribute value defined by the CI Directory.

    • CI: When you select CI as an element and the value is username and password, login credentials are stored in the CI password vault. Upon logging in to the application, it will retrieve the login details from the CI system, eliminating the need to re-enter them.

  • Enable OTP: Check the box if the application must ask for an OTP while logging in.  

  1. Click Save. An “Application Updated Successfully” confirmation message is displayed.

  2. Click Close.

Application Authorization

An Administrator allows you to create users and roles.

Authorize Roles

As an administrator, CI allows you to select specific roles authorized to access an application.

To authorize roles:

  1. Navigate to Application Authorization. The application authorization screen is displayed

  2. Click Authorize Role > Add Role. The Add Role screen is displayed.

  1. Enter a Role Name in the search field.

  2. Select a role from the results and then click Add

  3. The added role is displayed on the screen.

Information:

Based on the role type, it allows the user to select either static or dynamic.

Authorize Users

As an administrator, CI allows users to access each application.

To authorize users, perform the following steps:

  1. Click Authorize Users > Add User. 

  2. Enter a username in the search field.

  3. Select a user from the results and then click Add

  1. The added user is displayed on the screen.

Information:

You can remove users from the Remove User tab.

Browser Preference

Cross Identity provides cross-browser support for legacy applications which can be run only on specific browsers. With the help of a cross-browser agent, even though the user is accessing Cross Identity in any browser, SSO for the application will be performed in the specific browser based on the preference selected.

To select browser preference, perform the following steps:

  1. Navigate to Browser Preference

  2. Check the box Enable browser preference. The list of browsers appears to allow the user to select one:

    • Firefox

    • Internet Explorer

    • Chrome

    • Microsoft Edge

  3. Select your preferred browser to assign a browser to the application.

  4. Click Save.

Password Sync

Password Sync synchronizes new passwords with Cross Identity’s password vault. Whenever users perform SSO to the application, they would not need to update the credentials vault manually.

To enable password sync, perform the following steps:

  1. Navigate to Password Sync

  2. Check the box Enable password sync? to activate password sync.

  3. Click Save. A “Password sync setting updated successfully” confirmation message is displayed.

Provisioning

You can associate a provisioning application with each Web SSO application. If you have an owned account Provisioning in the provisioning application, the SSO icon of the web application comes up on your SSO launchpad.

To associate the provisioning of an application:

  1. Navigate to Provisioning

  2. Select Associate a provisioning application. Select the IGA application associated with the provisioning application from the drop-down list.

  3. Click Save. A “Successfully associated provisioning application” confirmation message is displayed.

License

This applies to the pay-per-use model, where the admins can assign a specific number of licenses for use in SSO. This prevents over-utilization of the application. 

  1. Navigate to License

  2. Max. User Licenses: Enter the number of licenses which can be issued to the application.

  3. Application License Price: Enter the price for each license to calculate the total cost and display it on the Consumption Dashboard.

  4.  Click Save.

SSO Method

This will apply only if you want Token-Based authentication with a web application. 

The SSO method tab contains the following elements: 

  1. Navigate to the SSO Method.

  2. Select how single sign-on for this application is to be performed by choosing from the below options: 

  1. Password Vaulting & Forwarding: OTP-based authentication will be performed if this option is selected.

Password Vaulting: 

  • CI uses password vaulting and forwarding techniques to perform Single Sign-On to Web Applications, which do not support standards like SAML or OAuth.

  •  The password vault can be configured to use AD/LDAP credentials during the forwarding.

  • When a user accesses an application for the first time, CI prompts the user to register/store the credentials in the password vault. 

  • The password is encrypted and stored in the vault.

  • The password vault is stored on the Cross Identity cloud. 

  • When a user accesses the application subsequently, the password from the vault is decrypted and forwarded to the application    

2. Token-based: If this option is selected, token-based authentication will be performed. Refer to Token-Based Integration.

3. Proxy Server Required? If this option is selected, the admin must fill in proxy server requirements. This option is not dependent on any other functionality. 

  • Proxy Server: Enter the proxy server.

  • Proxy Port: Enter the proxy port number.

Configurations for token-based authentication: 

Follow the steps for token-based authentication in the SSO Method tab: 

  1. Token API URL: Enter the token API URL. It is a mandatory parameter. 

  2. Request Parameters: This section has an ‘Add’ button to add the required rows for request parameter configuration. On the click of the Add button, a new row will be added to capture the following information:

  • Parameter Name: This text field captures the request parameter name.

  • Parameter Type: The drop-down field contains options such as Static Value/User Attribute/Expression. Based on the parameter type selected, the parameter value field will display either textbox/ attribute drop-down/text area.

Parameter Value: This field will display a textbox/attribute drop-down/ text area based on the parameter type selected. 

  • If the parameter type selected is Static Value, a text box will be displayed to enter the static value in this column.

  • If the parameter type selected is User Attribute, a drop-down will be displayed with this column's list of user attributes.

  • If the parameter type selected is Expression, then the text area will be displayed in this column to capture the expression.  

Notes:

  1. Each row will have a Delete icon to delete the unwanted row. 

  2. By default, only one row will be displayed to configure request parameters.

3. Admin can configure the mode to send the request parameters with the help of the following checkbox options:

  • Send request parameters in the body: If this option is selected, the configured request parameters will be sent in the request body.

  • Send request parameters in the header: If this option is selected, the configured request parameters will be sent in the request header with the following additional configurations.

  • Header Parameter: This section will have an ‘Add’ button to add the required rows to request parameter configuration. On the click of the Add button, a new row will be added to capture the following information:  

  • Parameter Name: This text field captures the request parameter name.

  • Parameter Type: This drop-down field contains options as Static Value/User Attribute/Expression. Based on the parameter type selected, the parameter value field will display either textbox/attribute drop-down/text area.

  • Parameter Value: This field will display a textbox/attribute drop-down/ text area based on the parameter type selected. 

    • If the parameter type selected is Static Value, a text box will be displayed to enter the static value in this column.

    • If the parameter type selected is User Attribute, a drop-down will be displayed with a list of user attributes in this column.

    • If the parameter type selected is Expression, then the text area will be displayed in this column to capture the expression.  

      Notes:

      1. Each row will have a Delete icon to delete the unwanted row. 

      2. By default, only one row will be displayed to configure request parameters.

4.  A checkbox will be made available to the admin user to enable/disable base64 encoding for request parameters with the text ‘Perform Base64 encoding of request parameters.

5. Response Parameters: This is the section title to capture the details of the response.

  • Parameter Name: This text box will capture the name of the response parameter received from the token API. 

  • A checkbox will be made available to the admin user to enable/disable base64 encoding for the response parameter with the text  ‘Perform Base64 decoding of response parameter’.

6. An option will be made available to the admin user to select how the token should be sent to the application. It will have the following details:  

  • HTTP GET: If this option is selected, the token will be requested with an HTTP GET protocol. 

  • HTTP POST: If this option is selected, the token will be requested with an HTTP POST protocol. 

7. Request Parameter Name: This text box will allow the admin user to configure the request parameter name.

8. Click Save. 

Bookmark URL

It is an auto-generated one-of-a-kind application URL issued by Cross Identity. This URL allows an end user to bypass the Launchpad and directly enter it into a web browser to access the application.

An admin needs to provide the URL to an end user by email.




Was this article helpful?