Introduction

Use this guide to configure a SecureAuth IdP realm's token / cookie settings.

 


Prerequisites

SecureAuth IdP 9.x+ deployed, with a New Realm created for Single Sign-on (SSO) and the following tabs configured on the SecureAuth IdP Web Admin: Overview, Data, Workflow, Multi-Factor Methods.

 


SecureAuth IdP Configuration Steps

Post Authentication Tab

1. In the Forms Auth / SSO Token section, click View and Configure FormsAuth keys / SSO token to configure the token / cookie settings and to configure this realm for SSO. 

2. On the Forms Auth / SSO Token page, in the Forms Authentication section, if SSL is required to view the token, select True from the Require SSL dropdown.

3. Choose whether SecureAuth IdP will deliver the token in a cookie to the user's browser or device:

4. Set the Sliding Expiration to True if the cookie remains valid as long as the user is interacting with the page.

5. Set the Timeout value to determine the number of minutes a cookie is valid.

6. No configuration is required for the Pre-Auth Cookie, Post-Auth Cookie, or the Clean Up Pre-Auth Cookie fields.

7. In the Machine Key section, no changes are required in the Validation field unless the default value does not match the company's requirement.

If a different value is required, select it from the dropdown.

8. No changes are required in the Decryption field, unless the default value does not match the company's requirement.

If a different value is required, select it from the dropdown.

9. No configuration is required for the Validation Key or Decryption Key fields.

10. In the Authentication Cookies section, enable the cookie to be Persistent by selecting True - Expires after Timeout from the dropdown.

Selecting False - Session Cookie enables the cookie to be valid as long as the session is open. The cookie will expire once the browser is closed or the session expires.

11. No configuration is required for the NameLogin URL, or Domain fields.

12. Click Save once the configuration is complete and before leaving the Forms Auth / SSO Token page to avoid losing changes.