How double authentication works
The process of double authentication is as follows:
- After the first level of authentication, the user's browser sends a reauthentication request to URL.
An () agent redirects the user to the server URL for reauthentication.
For SAML authentication, redirects the user to the SAML IdP for reauthentication. If the SAML IdP supports the ForceAuthn feature on an authentication request, the IdP requests the user for reauthentication.
The agent identifies a reauthentication request by the query parameter reauth, which is set to true by default. For a reauthentication request, the agent identifies the server and the application realm the same way that the agent identifies these for any other authentication request.
- For authentication, the server prompts the user to confirm the password.
For SAML authentication, the IdP prompts the user for both username and password. If the authentication is successful, the IdP redirects the user back to the server with a SAML response. The server checks whether the user in the SAML response is the same user who is currently logged in to . If they are not the same user, the reauthentication fails. - If the reauthentication process is successful, the server generates a reauthentication token and redirects the user to the URL.
The reauthentication token is valid only for a short period and is specific only to the reauthentication process. It cannot be used for the usual authentication process. - The agent retrieves the reauthentication token and passes it on to servlet.
- The servlet retrieves the reauthentication token and passes it on to the as an authentication string.
- verifies the user's credential, user name, and reauthentication token through the AREA plugin.
- The AREA plugin verifies the reauthentication token through an API call to the server.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*