SessionConfiguration
Current File(s): conf/idp.properties
Format: Properties
Overview
An IdP session is created by default (idp.session.enabled=true) upon a successful authentication event. The IdP session uses a sliding window expiration policy that is updated under one of two conditions:
An existing authentication result stored in the session is used to satisfy a request.
A new authentication result is created from a successful user authentication event in order to satisfy security demands made by an SP. The new result is also stored in the session.
Thus the IdP session tracks all authentication events that occur during the lifetime of the session, represented by objects of type AuthenticationResult. When the idp.session.trackSPSessions flag is enabled, the IdP session also tracks successful requests to access SPs, represented by objects of the base interface SPSession; this data is required to support single logout.
The IdP session stores each AuthenticationResult keyed on the ID of the login flow that handles the authentication process. The consequence of this design is that a subsequent invocation of the same login flow, for example in response to a forced authentication request, would overwrite a previous result of the same flow. Results stored in the IdP session are themselves subject to expiration by a sliding window up to an absolute limit. If an SP makes a request to the IdP and there is no active authentication result that satisfies the security demands of the SP, the user is forced to reauthenticate.
(A deeper dive into the internals of this design can be found in the Sessions topic.)
Cookie Management
The underlying mechanism that tracks sessions in the client is of course a cookie. By default, this cookie is session-bound (in a browser sense) and is supposed to be disposed of when the browser closes. This has been largely untrue for many years due to browser session restore behavior, which is entirely at the browser’s discretion. However, for shared devices that are properly locked down, this is an appropriate choice since it does allow restarting the browser or desktop to more or less guarantee disposal of the session (whereas logout is much less reliable).
In the event that very long-lived sessions (on the order of weeks or longer) is desired, the idp.session.persistent property can be set to true to make these cookies persistent instead of session-based, with the expiration based on the idp.cookie.maxAge property (a year by default). This does NOT make the session itself “valid” for any particular length of time, it merely ensures that access to the session data if it is present will continue for the life of the cookie, at which point the normal behavior kicks in and the session’s validity will be determined the same way as it always is. The cookie may exist forever, but after the configured timeout elapses without use, the data will no longer be accessible to the IdP and the session will be gone. The cookie’s expiration is only an upper bound on the session’s expiration.
Address Binding
IdP sessions are by default bound to an "address" in order to prevent trivial session takeover simply through session cookie exposure. This can be disabled via the Idp.session.consistentAddress property or relaxed in various ways through the idp.session.consistentAddressCondition extension point. It is deeply ill-advised to simply disable this checking entirely and quite unsafe to operate networks that hide a plethora of clients behind a single address.
The latter extension point relies on supplying a BiPredicate (a condition that takes two inputs). The first parameter is the address string to which the session is already bound, and the second parameter is the address string that is being tested/evaluated for “equivalence” with the first parameter. That is, the default implementation of this simply compares the two strings for equality.
One existing implementation of this feature is the IPRangeBiPredicate class, which is configured with a number of IPRange objects, and will consider the two input strings “equivalent” if they both fall into one of the supplied ranges.
The session address binding layer supports simultaneous binding of sessions to both IPv4 and IPv6 addresses so clients may use both types and float between them.
There is an additional advanced option to support arbitrary string values as "addresses", produced by a strategy function of type Function<ProfileRequestContext,String> defined with the bean ID shibboleth.SessionAddressLookupStrategy. The absence of this bean relies on the servlet container's REMOTE_ADDR value as in prior versions. For now, it is necessary that values returned by this function NOT contain periods or colons so as to avoid confusing the system into treating the value as an IP address. This limitation may be addressed in the future. Encoding the string is a means of avoiding the problem.
Note that this alternative "address" feature is NOT a substitute for proper web server configuration in the event of proxying. If you try that, the IdP will break in other places because there are lots of dependencies on being able to obtain the proper address from the web server.
Session Timeouts
In many cases an SSO deployment must satisfy policy requirements around how frequently users must reauthenticate. There are three properties that generally determine authentication frequency:
idp.session.timeout (default PT60M)
idp.authn.defaultLifetime (default PT60M)
idp.authn.defaultTimeout (default PT30M)
Note that the latter two, being authentication-related were moved to conf/authn/authn.properties in V4.1+, but may remain in idp.properties on upgraded systems. The exact location doesn't matter, all properties are loaded as a set.
Under the default configuration, user authentication occurs hourly except in cases where the IdP session (and thus any contained authentication result) is idle for more than 30 minutes. Note that some authentication methods may be non-interactive such that users don't actually have to explicitly provide credentials (IPAddress, X509Internal), but an authentication event is nonetheless occurring hourly under the default configuration.
Simple Session Lifetime Example
An example may be helpful in further clarifying how session configuration defines security policy around user authentication. Suppose a deployer wants to implement the following security policy:
Users must authenticate at least once daily.
An IdP session may remain idle at most for 1 day.
# IDP session timeout must be at _least_ as long as authn result lifetime
idp.session.timeout=PT24H
# Authentication results live for at most 24 hours
idp.authn.defaultLifetime=PT24H
# Authentication results may be idle for at most 60 minutes
idp.authn.defaultTimeout=PT60M
Advanced Session Lifetime Example
In some cases it may be permissible to allow some authentication methods to have longer lifetimes than others; for example, an authentication result produced by a hardware token may be valid for a day whereas that of a password credential is valid for an hour. These policies are accommodated by defining a conservative idp.authn.defaultLifetime and more liberal periods for specific authentication methods. A hypothetical security policy follows with the configuration required to implement it.
Users must authenticate every hour using a password credential
Users must authenticate daily using a hardware token containing an X.509 certificate
An IdP session may be idle for at most 1 day under any circumstances
# IDP session timeout must be at _least_ as long as longest authn result lifetime
idp.session.timeout=PT24H
# Conservative default authentication result lifetime is 60 minutes
idp.authn.defaultLifetime=PT60M
# Defines idle time on authentication results. Not overridden per authn method in this case.
idp.authn.defaultTimeout=PT60M
idp.authn.X509.lifetime = PT24H
idp.authn.X509.supportedPrincipals = \
saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:X509,
saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient,
saml1/urn:ietf:rfc:2246
Reference