Hi Igor,
There are some tricks with session cookies that you can use if the domains have a common DNS component (domain1.common.com and domain2.common.com). Check the
[session-cookie-domains] stanza and information on the shared-domain-cookie in
[session] stanza. However, there are security implications of doing this and I also seem to remember that this isn't enough to share sessions between Virtual Host Junctions (because of the way sessions are managed internally).
To truly get SSO between DNS domains you need to transfer some token between the domains (even if they are on the same WebSEAL). That's just how HTTP sessions are designed. WebSEAL has some older proprietary ways of doing this - check out e-community single sign-on in the docs - or, if you have access to the capabilities, you can set up a SAML or OIDC federation to handle it.
It is quite a common usage pattern to have one WebSEAL set up as an "Identity Provider" (where all authentication is done) and then have other WebSEALs in front of applications which act as "Service Providers". This provides good support for multi-domain environments and sets you up well for integration with cloud SaaS services (either directly or via IBM Cloud Identity).
I hope this helps.
Jon.
------------------------------
Jon Harry
Consulting IT Security Specialist
IBM
------------------------------
Original Message:
Sent: Wed November 27, 2019 03:17 AM
From: Igor Vinogradov
Subject: Cross-domain authentication
If there is WebSEAL in two different domains, is it possible to provide SSO between them? After authenticating in domain A by login / password, go to domain B without re-authentication and vice versa.
------------------------------
Igor Vinogradov
------------------------------