Authentication and authorization overview

For reference, see Access Gateway Functional Components Overview for a complete picture of how the Access Gateway components operate together.

Authentication Component

Access Gateway AuthenticationAuthentication is distinct from authorization, which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual. Authentication methods and protocols include direct auth, delegated auth, SAML, SWA, WS-Fed, and OpenID Connect. component contains the SAMLAn acronym for Security Assertion Markup Language, SAML is an XML-based standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider (SP). The SAML standard addresses issues unique to the single sign-on (SSO) solution, and defines three roles: the end user, the IdP, and the SP. Here's how SAML works through Okta: SP-initiated flow: the end user requests (principally through a browser) a service from the SP. The SP requests and obtains an identity assertion from the IdP (in this case, Okta). On the basis of this assertion, the SP can decide whether or not to authorize or authenticate the service for the end user. IdP-initiated flow: with Okta as the IdP, an end user goes to the Okta browser and clicks on an app, sending a SAMLResponse to the configured SP. A session is established with the SP, and the end user is authenticated. functionality, identity provider capabilities, handshake logic, and more.

SAML Service Provider

Access Gateway supports user flows that originate from an Identity Provider by acting as a service provider via SAML protocol. This functionality enables applications that lack SAML components to authenticate with IDaaS solutions without custom development.

Identity Provider

Access Gateway also provides identity provider capabilities through clientEssentially, a client is anything that talks to the Okta service. Within the traditional client-server model, Okta is the server. The client might be an agent, an Okta mobile app, or a browser plugin. certificate authentication. Additionally, there are alternate authentication methods available.

Handshake and Authorization Session

Temp auth cookie Populate session attributes SAML attributes Static values External data source lookups

Authorization Component

The Authorization component handles sessions and policies for the Access Gateway appliance.

Handshake from Authentication

Once a user is authenticated, Access Gateway can upgrade an authorization cookie to a session cookie.

Sessions

  • Per application

  • Idle, max

  • Finger printing

  • Session cookie

Policy

  • Authorized users

  • Unauthorized users

  • Rule-based

  • Certificates

Top