SlideShare a Scribd company logo
JWT SSO Inbound Authenticator
June 18, 2020
The JWT SSO - An Introduction
● JWT SSO is an authentication protocol used to authenticate the user based on
the JWT token.
● The application relies on the JWT token and uses the JWT token as the
source of authentication in the SSO flow.
What is JWT SSO?
3
Simply because, simplicity!
1. Work with simple redirections
2. Easy to process from the application
Once the application receives the JWT token,
1. Verify the JWT token.
2. Get the user claims.
3. Provision the user if the user does not exist.
4. Let the user sign in to the application.
But why?
4
Where it is being used?
5
How it works?
1. The JWT Token - Mandatory
The JWT token which includes the
user claims signed with shared secret
1. Return to URL - Optional
URL to redirect the user after the successful authentication.
1. Error URL - Optional
URL to redirect the user in case of an error occurred in the application,
when processing the authentication response received from the IDP.
What the application expects?
7
The application require to send the values as URL query parameters.
https://applicationdomain.com/jwt?jwt={payload}
&return_to={return_to_url}
&error_url={error_url}
How it expects?
8
9
The flow
Configuration
1. Enable SSO to the application using JWT
2. Retrieve Site URL (SSO endpoint)
⦿ The URL to redirect the user with the JWT token after the successful authentication
3. Obtain the API Key (Shared secret)
⦿ The key to sign the JWT token
1. Enable JWT SSO on the application
11
2. Get the JWT SSO Connector
12
1. Get the connector from WSO2 IS Connector Store
2. Add it to dropins directory
3. Enable /identity endpoint
⦿ [[resource.access_control]]
context="/identity(.*)"
secure="false"
http_method="GET"
3. Register the service provider
13
4. Configure the claims
14
1. SSO Request
⦿ https://localhost:9443/identity/jwtsso?jwtRP=lms-test-app
2. SLO Request
⦿ https://localhost:9443/identity/jwtsso/logout?jwtRP=lms-test-app
5. Testing the flow
15
Wrapping-up!
1. A simple way to implement SSO without proper specifications with some
security concerns!
⦿ The application must validate the JWT token against the JWT signature
⦿ The token must be accepted by the application for authentication within the
specified time period considering the exp claim.
⦿ The token must only be used once to authenticate the user by invalidating the token
using the jti claim.
2. Work with simple redirections.
3. Supported by miniOrange.
Conclusion
17
Question Time!
18
wso2.com
Thanks!

More Related Content

PPTX
Secure your app with keycloak
PPTX
Building secure applications with keycloak
KEY
OpenID vs OAuth - Identity on the Web
PPTX
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
PPT
OAuth 2.0 and OpenId Connect
PDF
Single Sign On with OAuth and OpenID
PPT
OAuth2 Protocol with Grails Spring Security
PDF
Spring security oauth2
Secure your app with keycloak
Building secure applications with keycloak
OpenID vs OAuth - Identity on the Web
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
OAuth 2.0 and OpenId Connect
Single Sign On with OAuth and OpenID
OAuth2 Protocol with Grails Spring Security
Spring security oauth2

What's hot (20)

PPTX
Identity management and single sign on - how much flexibility
PDF
CIS14: Working with OAuth and OpenID Connect
PPTX
Mit 2014 introduction to open id connect and o-auth 2
PDF
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
PDF
Stateless Auth using OAuth2 & JWT
PPTX
Draft: building secure applications with keycloak (oidc/jwt)
PPTX
Securing your APIs with OAuth, OpenID, and OpenID Connect
PPT
Web 20 Security - Vordel
PDF
ConFoo 2015 - Securing RESTful resources with OAuth2
PPT
Openid & Oauth: An Introduction
PPTX
OAuth2 & OpenID Connect
PPTX
OpenID Connect 1.0 Explained
PDF
Json web token api authorization
PDF
Foreman Single Sign-On Made Easy with Keycloak
PDF
JavaOne 2014 - Securing RESTful Resources with OAuth2
PDF
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
PDF
Full stack security
PPTX
An Introduction to OAuth2
PDF
OpenID Connect - An Emperor or Just New Cloths?
PDF
Protecting web APIs with OAuth 2.0
Identity management and single sign on - how much flexibility
CIS14: Working with OAuth and OpenID Connect
Mit 2014 introduction to open id connect and o-auth 2
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
Stateless Auth using OAuth2 & JWT
Draft: building secure applications with keycloak (oidc/jwt)
Securing your APIs with OAuth, OpenID, and OpenID Connect
Web 20 Security - Vordel
ConFoo 2015 - Securing RESTful resources with OAuth2
Openid & Oauth: An Introduction
OAuth2 & OpenID Connect
OpenID Connect 1.0 Explained
Json web token api authorization
Foreman Single Sign-On Made Easy with Keycloak
JavaOne 2014 - Securing RESTful Resources with OAuth2
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
Full stack security
An Introduction to OAuth2
OpenID Connect - An Emperor or Just New Cloths?
Protecting web APIs with OAuth 2.0
Ad

Similar to JWT SSO Inbound Authenticator (20)

PPTX
Uniface Lectures Webinar - Application & Infrastructure Security - JSON Web T...
PPTX
REST Service Authetication with TLS & JWTs
PDF
Introduction to JWT and How to integrate with Spring Security
PDF
Securing Web Applications with Token Authentication
PDF
Landscape
PDF
Landscape
PPTX
DDD Melbourne 2019 : Modern Authentication 101
PDF
WTH is a JWT
PDF
5 easy steps to understanding json web tokens (jwt)
PDF
What the Heck is OAuth and Open ID Connect? - UberConf 2017
PDF
What the Heck is OAuth and OpenID Connect - RWX 2017
PDF
[WSO2 API Manager Community Call] Mastering JWTs with WSO2 API Manager
PDF
OAuth and OpenID Connect for Microservices
PDF
JSON WEB TOKEN
PPTX
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
PPTX
Y U No OAuth, Using Common Patterns to Secure Your Web Applications
PDF
What the Heck is OAuth and OpenID Connect - DOSUG 2018
PPTX
Json Web Token - JWT
PDF
InterCon 2016 - Segurança de identidade digital levando em consideração uma a...
Uniface Lectures Webinar - Application & Infrastructure Security - JSON Web T...
REST Service Authetication with TLS & JWTs
Introduction to JWT and How to integrate with Spring Security
Securing Web Applications with Token Authentication
Landscape
Landscape
DDD Melbourne 2019 : Modern Authentication 101
WTH is a JWT
5 easy steps to understanding json web tokens (jwt)
What the Heck is OAuth and Open ID Connect? - UberConf 2017
What the Heck is OAuth and OpenID Connect - RWX 2017
[WSO2 API Manager Community Call] Mastering JWTs with WSO2 API Manager
OAuth and OpenID Connect for Microservices
JSON WEB TOKEN
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
Y U No OAuth, Using Common Patterns to Secure Your Web Applications
What the Heck is OAuth and OpenID Connect - DOSUG 2018
Json Web Token - JWT
InterCon 2016 - Segurança de identidade digital levando em consideração uma a...
Ad

Recently uploaded (20)

PPTX
history of c programming in notes for students .pptx
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
Transform Your Business with a Software ERP System
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
ai tools demonstartion for schools and inter college
PDF
AI in Product Development-omnex systems
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Nekopoi APK 2025 free lastest update
PPTX
Introduction to Artificial Intelligence
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
System and Network Administraation Chapter 3
PDF
Design an Analysis of Algorithms II-SECS-1021-03
history of c programming in notes for students .pptx
CHAPTER 2 - PM Management and IT Context
How to Migrate SBCGlobal Email to Yahoo Easily
Softaken Excel to vCard Converter Software.pdf
Understanding Forklifts - TECH EHS Solution
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Transform Your Business with a Software ERP System
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Reimagine Home Health with the Power of Agentic AI​
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Odoo POS Development Services by CandidRoot Solutions
Upgrade and Innovation Strategies for SAP ERP Customers
ai tools demonstartion for schools and inter college
AI in Product Development-omnex systems
2025 Textile ERP Trends: SAP, Odoo & Oracle
Nekopoi APK 2025 free lastest update
Introduction to Artificial Intelligence
How to Choose the Right IT Partner for Your Business in Malaysia
System and Network Administraation Chapter 3
Design an Analysis of Algorithms II-SECS-1021-03

JWT SSO Inbound Authenticator

  • 1. JWT SSO Inbound Authenticator June 18, 2020
  • 2. The JWT SSO - An Introduction
  • 3. ● JWT SSO is an authentication protocol used to authenticate the user based on the JWT token. ● The application relies on the JWT token and uses the JWT token as the source of authentication in the SSO flow. What is JWT SSO? 3
  • 4. Simply because, simplicity! 1. Work with simple redirections 2. Easy to process from the application Once the application receives the JWT token, 1. Verify the JWT token. 2. Get the user claims. 3. Provision the user if the user does not exist. 4. Let the user sign in to the application. But why? 4
  • 5. Where it is being used? 5
  • 7. 1. The JWT Token - Mandatory The JWT token which includes the user claims signed with shared secret 1. Return to URL - Optional URL to redirect the user after the successful authentication. 1. Error URL - Optional URL to redirect the user in case of an error occurred in the application, when processing the authentication response received from the IDP. What the application expects? 7
  • 8. The application require to send the values as URL query parameters. https://applicationdomain.com/jwt?jwt={payload} &return_to={return_to_url} &error_url={error_url} How it expects? 8
  • 11. 1. Enable SSO to the application using JWT 2. Retrieve Site URL (SSO endpoint) ⦿ The URL to redirect the user with the JWT token after the successful authentication 3. Obtain the API Key (Shared secret) ⦿ The key to sign the JWT token 1. Enable JWT SSO on the application 11
  • 12. 2. Get the JWT SSO Connector 12 1. Get the connector from WSO2 IS Connector Store 2. Add it to dropins directory 3. Enable /identity endpoint ⦿ [[resource.access_control]] context="/identity(.*)" secure="false" http_method="GET"
  • 13. 3. Register the service provider 13
  • 14. 4. Configure the claims 14
  • 15. 1. SSO Request ⦿ https://localhost:9443/identity/jwtsso?jwtRP=lms-test-app 2. SLO Request ⦿ https://localhost:9443/identity/jwtsso/logout?jwtRP=lms-test-app 5. Testing the flow 15
  • 17. 1. A simple way to implement SSO without proper specifications with some security concerns! ⦿ The application must validate the JWT token against the JWT signature ⦿ The token must be accepted by the application for authentication within the specified time period considering the exp claim. ⦿ The token must only be used once to authenticate the user by invalidating the token using the jti claim. 2. Work with simple redirections. 3. Supported by miniOrange. Conclusion 17

Editor's Notes

  • #5: SSO with simple redirections
  • #6: Thinkific - LMS Zendesk - Customer support ticket system & sales CRM Sisense - BI & Analytics Platform Aha - Roadmap software