Skip past navigation linksSecure Global Desktop Administration Guide > Users and authentication > Web server/third party authentication

Web server/third party authentication

Overview

Web server/third party authentication allows users to log in to Secure Global Desktop if they have been authenticated by an external mechanism, such as web server authentication.

If you are using either the classic or browser-based webtop, you can only use web server authentication with these webtops. If you develop your own webtop applications using the Secure Global Desktop web services, you can use any external/third party authentication mechanism.

Web server authentication for the classic webtop is enabled by default.

Third party authentication for the browser-based webtop is disabled by default.

Logging in

The user types in a username and password directly to the external mechanism, typically using their web browser's authentication dialog.

Authentication

Web server/third party authentication is based on trust. Secure Global Desktop trusts that the web server/third party mechanism has authenticated the user correctly and so they are authenticated to Secure Global Desktop.

User identity and login profile

Once a user has been authenticated, Secure Global Desktop performs a search to establish the user's identity and login profile (see below).

To perform the search, one or more of the identity mapping search methods must be enabled on the Secure Global Desktop Login properties panel in Array Manager. The methods are tried in the order they are listed (see below).

If the searches do not produce a match, Secure Global Desktop can't establish an identity for the user and so the standard Secure Global Desktop login page displays. The user must log in to Secure Global Desktop so that a login authority can be tried.

Web server/third party authentication does not support ambiguous users and so the first match found is used.

Search ENS for matching person

Searches ENS for a person object with a Name, Username or Email Address attribute that matches the user's web/third party username.

User identity

The matching person object in ENS.

Login profile

The matching person object in ENS.

Search LDAP and use closest ENS match

Searches the LDAP directory for a person object with a cn (common name) attribute that matches the user's web/third party username. If there's no match, the search is repeated on the uid (username) attribute, and finally on the mail (email address) attribute.

User identity

The identity is the LDAP person object and has the form .../_service/sco/tta/ldapcache/LDAP-person.

Login profile

The first match of the following is used:

  1. A person object in ENS with the same name as the LDAP person object, allowing for differences in the naming system. For example, if the LDAP object cn=Indigo Jones,ou=Administration,o=Indigo Insurance is found, this login authority would search ENS for o=Indigo Insurance/ou=Administration/cn=Indigo Jones.
  2. A person object in ENS, with the name cn=LDAP Profile, in the same OU as the LDAP person object. For example, o=Indigo Insurance/ou=Administration/cn=LDAP Profile.
  3. A person object in ENS, with the name cn=LDAP Profile, in any parent OU for the LDAP person object. For example, o=Indigo Insurance/cn=LDAP Profile.
  4. The default LDAP profile object o=Tarantella System Objects/cn=LDAP Profile.

Search LDAP and use LDAP User Profile

Searches the LDAP directory for a person object with a cn (common name) attribute that matches the user's web/third party username. If there's no match, the search is repeated on the uid (username) attribute, and finally on the mail (email address) attribute.

User identity

The identity is the LDAP person object and has the form .../_service/sco/tta/ldapcache/LDAP-person.

Login profile

The profile object o=Tarantella System Objects/cn=LDAP Profile is always used for the login profile.

Use default profile

No search is performed.

User identity

For classic web server authentication, the user's identity is always .../_service/sco/tta/webauth/web-username.

For third party authentication, the user's identity is always .../_service/sco/tta/thirdparty/thirdparty-username.

Login profile

For classic web server authentication, the profile object o=Tarantella System Objects/cn=Web User Profile is always used for the login profile.

For third party authentication, the profile object o=Tarantella System Objects/cn=Third Party Profile is always used for the login profile.

Emulator sessions and password cache entries

Emulator sessions and password cache entries belong to the identity established by the identity mapping search methods.

Related topics