지금 지원 담당자와 채팅
지원 담당자와 채팅

Cloud Access Manager 8.1.2 - How To Configure Single Sign-On for Native IOS Applications

Dell™ One Identity Cloud Access Manager 8.1.2 - How to Configure Single Sign-On for Native IOS Applications

This guide describes how to deploy Single Sign-On (SSO) for native IOS™ applications using the OpenID® Connect protocol, and includes the following information:

Overview

Using the OpenID® Connect protocol, the IOS™ application authenticates the user against Dell™ One Identity Cloud Access Manager and retrieves a set of three security tokens, as shown in Figure 1. The security tokens are known as the ID Token, Refresh Token and Access Token.

The ID Token contains a collection of identity claims about the user that can be used by the IOS™ application to identify the user. The Access Token allows the IOS™ application to securely access OAuth2 protected Web APIs on behalf of the user. When the Access Token expires, the Refresh Token is used by the IOS™ application to obtain a new Access Token, without the need for the user to re-authenticate as shown in Figure 2.

The Web API validates the Access Token by using it to obtain a set of claims about the user from Cloud Access Manager. The claims are then used by the Web API to identify the user and control the user’s access.

Application walkthrough

This sample application consists of two components:

The sample IOS™ application contains a package called openidconnect which can be used in a standard IOS™ project to authenticate users using the OpenID® Connect Code Flow. The sample Web API contains a .NET Open Web Interface (OWIN) middleware called CAMBearerTokenAuthentication. This can be used in a standard .NET Web API project to authenticate the IOS™ application using the Access Tokens obtained from Dell™ One Identity Cloud Access Manager.


5
The Web API validates the Access Token by using it to call the Cloud Access Manager User Info Endpoint. The validation is performed using the provided OWIN middleware which will cache the User Info responses. The OWIN middleware will also verify that the Access Token was scoped for itself by checking that the User Info response contains at least one of its scopes. The claims returned from the User Info Endpoint are used by the Web API to identify the user and control their access.
The standard Authorize attribute can be used on the Web APIs to restrict access. The Authorize attribute supports restrictions based on role and user claims which, by default map to the claim names role and preferred_username.
To utilize other claims, a custom AuthorizeAttribute can be created. For example:

Cloud Access Manager configuration

Perform the following configuration steps within Dell™ One Identity Cloud Access Manager to enable single sign-on to native IOS™ applications.

1
Make sure that the settings on the OpenID Connect / OAuth 2.0 Settings page are as follows:
2
Make sure that the settings on the Token Settings page are as follows:
3
Make sure that the settings on the Claim Mapping page are as follows:
셀프 서비스 도구
지식 기반
공지 및 알림
제품 지원
소프트웨어 다운로드
기술 설명서
사용자 포럼
비디오 자습서
RSS 피드
문의처
라이센싱 지원가져오기
기술 지원
모두 보기
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택