61 lines
1.8 KiB
Markdown

---
Title: Single Sign-On
---
# Single Sign-On
Besides Basic Authentication, you can use Content Application with:
- [Keycloak](https://www.keycloak.org/)
- [Identity Service](https://support.hyland.com/r/Alfresco/Alfresco-Process-Services/24.3/Alfresco-Process-Services/Configure/Authentication/Identity-Service)
- Kerberos
The application contains reasonable defaults for Single Sign-On (aka SSO) setup.
You can find the settings in the `app.config.json` file, and they look similar to the following:
```json
{
"providers": "ECM",
"authType": "BASIC",
"oauth2": {
"host": "http://localhost:4200/auth/realms/alfresco",
"clientId": "alfresco",
"scope": "openid",
"secret": "",
"implicitFlow": false,
"codeFlow": true,
"silentLogin": true,
"redirectSilentIframeUri": "./assets/silent-refresh.html",
"redirectUri": "/",
"redirectUriLogout": "/logout"
}
}
```
To switch from Basic Authentication to SSO mode, change the `authType` property value to `OAUTH`.
Also, the default configuration assumes you have an `alfresco` client pre-configured.
You can experiment with authentication modes on the http://localhost:4200/#/settings page:
![Authentication Settings](../images/aca-sso-settings.png)
## Kerberos
To enable support for the additional Kerberos features
please enable the `withCredentials` flag in the `app.config.json` file:
```json
{
"auth": {
"withCredentials": true
}
}
```
Note that with the `withCredentials` flag enabled, the application is not going to redirect users to Login screen
as the login process is handled entirely by Kerberos.
## See also
For more details on the ADF Login component and configuration options please refer to the [Login](https://www.alfresco.com/abn/adf/docs/core/components/login.component/#single-sign-on-sso) documentation.