Windows Identity Foundation 如何正确使用联合注销?
我使用 WIF 推出了自己的 STS 提供商,并且还有一些作为依赖方的应用程序。 STS 提供商的会话超时设置为 30 分钟,依赖方也是如此。
当某人想要注销依赖方和 STS 提供商时,他们会向 STS 提供商发出联合注销查询参数。
https://STSProvider.com/Default.aspx?wa=wsignout1.0
这将创建一个带有图像标签的页面,这些图像标签具有针对其登录的所有依赖方的联合注销请求。
问题在于,由于他们的会话在 STS 提供商上超时,因此会将他们踢回登录屏幕。并且不会提供包含依赖方的所有联合注销 img 标签的页面。因此,该人保持所有依赖方的登录状态。
在 STS 会话不能不确定的情况下,处理联合注销的最佳方法是什么?
I rolled my own STS provider using WIF and also have a few apps which are Relying Parties. The session timeout on the STS provider is set to 30mins and so are the relying parties.
When a person wants to signout of the Relying Parties and the STS provider they issue a federated logout query parameter to the STS provider.
https://STSProvider.com/Default.aspx?wa=wsignout1.0
This creates a page with image tags that have federated logout requests for all the relying parties they are signed into.
The problem with this is that, since their session timed out on the STS provider then it kicks them back to the login screen. And the page with all the federated logout img tags for the relying parties are not served. So, the person stays logged in to all the relying parties.
What is the best way to handle a federated logout where the STS's session cannot be indefinate?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
我想您使用 SessionSecurityToken 在 STS 上对用户进行身份验证。如果是这种情况,您可以尝试将其 IsPersistent 属性设置为 true。
I suppose you authenticate the user on the STS using SessionSecurityToken. If that is the case you can try setting its IsPersistent property to true.