BTB SSO Groups
BTB – Overview of Single Sign-On (SSO) and Single Logout (SLO)]]
Terminology:
- BTB: Federal Trust Broker
- SSO: Single Sign-On
- SLO: Single Logout
- QoA: Quality of Authentication (Infolink)
This documentation describes the SSO and SLO functionalities of the Federal Trust Broker (BTB), both from a technical perspective and from the perspective of end users and application managers.
SSO (Single Sign-On)
BTB-SSO enables the creation of so-called SSO/SLO groups. Such a group consists of trusted applications that share a user’s single authentication. After a successful login to one application within the group, no further login is required.Characteristics of SSO/SLO groups:
- An application can be assigned to exactly one SSO/SLO group; groups are disjoint.
- Within a group, all applications must use the same Identity Provider (IdP) and the same minimum Quality-of-Authentication level (QoA). Different IdPs or differing QoA levels will require a reauthentication – even if a BTB SSO session already exists.
- When switching from one application to another within the group, role memberships are re-read from the target tenant. This ensures that the second application receives a correct token with the appropriate role information.
- Applications may use different federation protocols (e.g., SAML, OIDC).
- Applications do not need to reside in the same access tenant.
Legacy PEP SSO (not BTB-based):
For applications operated under the same Policy Enforcement Point (PEP), a standalone SSO function can be implemented.Limitation: A Step-Up* within the session is not possible. All participating applications must assume the same (uniform) QoA level.
*Step-Up Authentication refers to reauthentication of the client at a higher QoA level when required for access to certain applications.
SLO (Single Logout)
The Single Logout (SLO) function ensures uniform logout across the entire SSO session.Triggers for logout:
- Manually logging out via a logout button
- Closing all browser windows
- Session timeout:
- 12 hours for active sessions
- 2 hours of inactivity
- 12 hours for active sessions
Logout behavior:
- Upon logout, an SLO request is sent to all participating applications in the SSO group.
- All applications must be capable of handling this logout request and responding appropriately (applications such as Easygov encountered technical issues here).
Application requirements
To be integrated into an SSO/SLO group, an application must meet the following requirements:- Support for login, logout, and re-login with the configured IdPs and the defined minimum QoA level
- Implementation of a functional logout button with appropriate logout logic
- Ability to correctly receive and process SLO requests
- Ensure that role memberships are correctly re-read when switching between applications
Ordering process & governance
- Ordering a new SSO/SLO group
- The PL customer/partner fills out the official form (link in the eIAM dossier) and uploads it to the relevant eIAM dossier
- Approval from all relevant ISBOs must be obtained by the PL customer/partner
- The group composition (participating applications) is defined by the PL customer/partner
- The application owner must ensure and test proper functionality (SSO & SLO)
- The PL customer/partner fills out the official form (link in the eIAM dossier) and uploads it to the relevant eIAM dossier
- Adding an application to an existing SSO/SLO group
- Same procedure as for new setup:
- Complete the form and upload to the dossier
- Approval from relevant ISBO(s)
- Complete the form and upload to the dossier
- eIAM INT can assist with identifying relevant ISBOs and group members, but responsibility remains with the PL customer/partner
- Application managers must ensure smooth integration
- Same procedure as for new setup:
- Removing an application from an existing group
- No new form required
- All stakeholders (eIAM INT, ISBOs, application owners) must be informed
- Technical integrity of the remaining group members must be ensured
- No new form required
Cost implications for customers
- Implementing SSO within a common Fully Qualified Domain Name (FQDN) (e.g., www.gate.bit.admin.ch) is part of the standard implementation (Remedy CRQ)
- For SSO across multiple FQDNs, paid consulting is required based on effort
Usage information for end users (FAQ)
Can I view my active SSO sessions? ▼×
No, this is currently not possible.
How can I avoid participating in an SSO/SLO session? ▼
×
Use a different browser or an incognito/private window to start a new, independent session.
I want to use CH-LOGIN but I’m being automatically logged in with FED-LOGIN? ▼
×
Use an incognito window or a private browser on a non-federal device to avoid session cookies and automated redirections.