Contents
Single Sign-On (SSO) allows users to authenticate using their organization’s central authentication service rather than maintaining separate Inventory Pro credentials. Once linked, users automatically log in when accessing the system through their organization’s network or authentication provider.
| SSO Method | Access Path | Purpose |
|---|---|---|
| Link SSO Account | Framework → Link SSO Account | Connect Inventory Pro user to Active Directory, Smart Card, or CAC credentials |
| Active Directory | Login (automatic) | Domain-based authentication using Windows credentials |
| Smart Card | Login (automatic) | Certificate-based authentication with PKI smart cards |
| CAC Authentication | Login (automatic) | Common Access Card authentication for government/military environments |
SSO eliminates password management overhead while improving security through centralized authentication policies and automatic session management.
Access: Framework → Link SSO Account (after initial login with Inventory Pro credentials)
SSO integrates with your organization’s authentication infrastructure to provide seamless access. Users log in once to their network/domain, and Inventory Pro automatically recognizes them based on linked credentials.
Screen Components:
Key Operations:
SSO Flow:
Associates an existing Inventory Pro user account with organizational SSO credentials. This one-time setup enables automatic future logins.
Required:
When to Link SSO:
When NOT to Link SSO:
Workflow:
What Happens:
zwUser table) updated with SSO credentialAD_USER stores credential identifier:DOMAIN\username)Authenticates users based on Windows domain credentials. Users who have logged into their Windows domain automatically gain access without additional passwords.
Required Admin Options:
ActiveDirectoryLogon = True (enables AD authentication)Server Requirements:
When to Use Active Directory:
Technical Details:
Request.ServerVariables("LOGON_USER")DOMAIN\usernamezwUser.AD_USER fieldSecurity Considerations:
Certificate-based authentication using PKI smart cards. Users insert their smart card, enter PIN, and system validates certificate to grant access.
Required Admin Options:
SmartCardLogon = True (enables smart card authentication)Server Requirements:
When to Use Smart Cards:
Technical Details:
Request.ServerVariables("CERT_SUBJECT")zwUser.AD_USER fieldCertificate Subject Example:
CN=John Doe,OU=Users,O=Organization,C=USConfigure Windows Authentication module on the web server:
Enable Windows Authentication for the Inventory Pro application:
Verification: Access the site - you should be prompted for domain credentials or automatically authenticated if on the domain.
Enable client certificate authentication:
Certificate Trust Configuration:
Configure SSO authentication methods in global.asa:
Active Directory Configuration:
Application("ActiveDirectoryLogon") = False to Application("ActiveDirectoryLogon") = TrueApplication("ActiveDirectoryForce") = False to Application("ActiveDirectoryForce") = TrueSmart Card Configuration:
Application("SmartCardLogon") = False to Application("SmartCardLogon") = TrueApplication("SmartCardForce") = False to Application("SmartCardForce") = TrueCAC Configuration:
Application("CACCardLogon") = False to Application("CACCardLogon") = TrueSmartCardLogon = TrueUser Field Configuration (enable AD_USER field for linking):
AD_USER field exists:AD_USER field doesn’t exist:AD_USER as the columnRestart Application:
iisreset to apply global.asa changesCommon Access Card authentication for government and military installations. Uses the unique identifier from CAC certificates for access control.
Required Admin Options:
CACCardLogon = True (enables CAC authentication)SmartCardLogon = TrueServer Requirements:
When to Use CAC:
Technical Details:
Request.ServerVariables("CERT_SUBJECT")zwUser.AD_USER fieldCAC vs Standard Smart Card:
| Option | Setting | Description |
|---|---|---|
| 3 | ActiveDirectoryLogon | Enables Active Directory domain authentication via LOGON_USER server variable |
| 3 | SmartCardLogon | Enables certificate-based smart card authentication via CERT_SUBJECT server variable |
| 3 | CACCardLogon | Enables Common Access Card authentication using unique EDIPI from certificate subject |
Configuration Notes:
global.asa or via Options interfaceSSO Implementation. Plan SSO rollout carefully to ensure infrastructure readiness. Test with small user groups before organization-wide deployment. Verify IIS authentication settings, certificate trust chains, and domain relationships. Document the linking process for users and provide assistance during transition. Maintain password-based access as fallback during initial implementation. Monitor for authentication errors and adjust timeout settings based on user workflows.
Certificate Management. Establish clear procedures for certificate renewal and expiration. Users should re-link accounts after certificate changes to avoid access disruption. Set calendar reminders before certificate expiration dates. For CAC environments, coordinate with issuing authorities for renewal timing. Test certificate updates in non-production environment first. Maintain documentation of certificate requirements and trusted root authorities.
Security Considerations. SSO does not reduce security requirements within Inventory Pro. Continue enforcing least-privilege access, regular permission audits, and security training. Monitor session activity for unusual patterns. Configure appropriate session timeouts balancing security and usability. Disable unused SSO methods to reduce attack surface. Coordinate with IT security team for compliance verification and security testing. Ensure audit logs capture SSO authentication events.
Problem: User logged in but no option to link SSO account. Solution: Verify admin option (ActiveDirectoryLogon, SmartCardLogon, or CACCardLogon) enabled in global.asa. Check that IIS authentication configured correctly. Confirm server variable (LOGON_USER or CERT_SUBJECT) being populated. Review error logs for detection failures. Prevention: Test SSO configuration with administrative account before user rollout. Create standard operating procedure for SSO verification.
Problem: System shows “SSO credential not available” or empty credential. Solution: For Active Directory: Verify Windows Authentication enabled in IIS and Anonymous disabled. Confirm user logged into domain. For Smart Cards/CAC: Check client certificate requirement in IIS. Verify smart card reader connected and card inserted. Test certificate installation in browser. Prevention: Document required IIS authentication settings. Provide user checklist for smart card access requirements.
Problem: Account linked successfully but login fails. Solution: Verify user account permissions unchanged. Check that domain account format matches exactly (case-sensitive). For certificate authentication, confirm certificate not expired. Review session timeout settings. Check that user not disabled or marked read-only. Prevention: Test linking process end-to-end before production use. Monitor authentication logs for failures.
Problem: User can authenticate via SSO on certain computers only. Solution: For AD: Verify all computers domain-joined and trusting web server. For Smart Cards: Confirm card readers installed with proper drivers. Check browser certificate settings consistent across computers. Verify network connectivity to domain controllers and certificate services. Prevention: Standardize computer configurations. Document minimum requirements for SSO access.
Problem: Smart card inserted but wrong certificate detected. Solution: User may have multiple certificates. Check certificate store in browser. Select correct certificate when prompted. Remove expired or invalid certificates. For CAC, verify correct EDIPI extracted (last 10 characters). Prevention: Train users on certificate selection. Implement certificate cleanup procedures.
Problem: Users logged out during active work. Solution: Adjust session timeout in admin options. Balance security requirements with user workflow needs. Consider extending timeout for users with long-duration tasks. Prevention: Survey users on typical session lengths. Set timeouts based on actual usage patterns.
Problem: User needs to revert to password authentication. Solution: Clear AD_USER field in zwUser table via database query or admin interface. User can then log in with password. Useful when certificate expires or user changes domains. Prevention: Provide administrative interface for SSO credential management.
SSO-specific reporting is limited as authentication occurs at infrastructure level. Standard user activity reports capture SSO logins:
| Report ID | Report Name | Description | Use Case |
|---|---|---|---|
| 39 | Error Log | System errors including authentication failures | Troubleshoot SSO configuration issues and failed login attempts |
| 37 | User Activity | Login/logout history with timestamps | Audit SSO usage, verify automatic authentication working |
| 67 | Session Activity | Active user sessions with login method | Monitor concurrent SSO sessions, validate session timeout policies |
Authentication Logging: System logs all authentication events including SSO credential detection, link operations, and login success/failure. Review logs regularly to identify configuration issues or security concerns.
On this page