How Redox Sits in between you and SSO
All single sign-on schemes hinge on validating that a user is who they say they are.
The goal of Redox SSO is to simplify all the moving pieces and roles to just two: you and Redox. You trust us to verify that the SSO request is valid, and we normalize and pull as much information to launch your application.
JSON Web Tokens
When setting up SSO, Redox will generate a shared secret that we sign our token with. You are responsible for validating the signature using this shared secret, along with fields in the token itself (for example, the expiration).
We recommend the useful tools and documentation at jwt.io (created by Auth0) for testing and debugging JWTs.
The HTTP request
The Redox SSO Data Model will send an HTTP
POST request to an endpoint you have configured in the dashboard.
- Verify the JSON Web Token (JWT) signature using the secret also set up in your endpoint
- Verify that the token is not expired (normally each SSO request will be a new token)
- Respond to the HTTP
302response and the
Locationheader set to a unique sign-in URL for your application
The overall flow will look like this:
Creating a session on redirect
Since the SSO request is proxied through Redox, it is impossible for the 302 response above to set cookies. Instead, you will need to pass the session information along in the URL. In order to do this securely we recommend using a one-time use token.
Redox will vouch that the SSO request coming to your application are indeed valid, authenticated users. Your application needs to handle a few other security details:
- Validate the token as described above
- Establish a user session via the redirect method described above
- It may be helpful to review the OWASP Session Cheat Sheet
- Your application owns the security of the sessions
- Expire the sessions as appropriate.
- The JWT will provide an expiration time, but this may need to be shortened based on your application policies
- Many EHR vendors we’ve worked with do not support single logout.
- Don’t use relative URLs. You don’t know what the url the browser will actually be set to when your content is loaded. For example it could be about:blank, or the initial Redox URL. Relative URLs will not redirect to your content in both of those cases.
- Set cookies after you redirect. Cookies are attached to the domain that they are set on, so if your content is inserted into a frame with about:blank, and then you redirect to your URL, the cookie will be inaccessible.