You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Implementation of New User Login Flow - IdP Discovery
Overview
We are introducing a new user login flow for the Catena-X Dataspace. This flow will utilize IDP-Discovery, eliminating the need for users to actively select their Identity Provider (IDP). Instead, the system will manage IDP selection based on the user's email address. This new flow aims to streamline the user experience and improve the login process.
What's the benefit?
The new user login flow with IDP-Discovery brings significant benefits, including a more streamlined and user-friendly login process, enhanced security, and better management capabilities. It positions Catena-X Dataspace for future growth and scalability while contributing valuable improvements to the Keycloak community.
Implementation Details
Current Flow
User navigates to the login page.
User selects their Identity Provider (IDP) from a list.
User enters their login credentials.
User is authenticated and logged in.
New Flow (IDP-Discovery)
User navigates to the login page.
User enters their email address.
System validates the email address.
System discovers the associated IDP(s) based on the email domain:
If a single IDP is discovered:
User is forwarded directly to the login page of the discovered IDP.
If multiple IDPs are discovered:
User is forwarded to a company login selection page to choose the appropriate IDP.
User enters their password/authentication details.
User is authenticated and logged in.
Impacted Products
Keycloak
Adjustments to the login flow to implement IDP-Discovery.
Modification of authentication logic to validate email and discover IDPs.
Keycloak Login Themes
Update to the login page UI to accommodate email input for IDP-Discovery.
Design and implementation of the company login selection page.
What are the Risks?
None
Contribution Timeline
We plan to contribute the code for this new login flow within the next release scheduled for 25th June.
Benefits
Enhanced User Experience: Simplifies the login process by reducing the steps required for the user to select their IDP.
Improved Efficiency: Automates the discovery of IDPs based on email addresses, reducing user effort.
Streamlined Authentication: Ensures a smoother transition from email input to authentication.
Feature Team
Contributor
Cofinity-X (Saloni & Shahin)
Committer
open
User Stories
Issue 1, linked to specific repository
Issue 2, linked to another specific repository
Acceptance Criteria
General Acceptance Criteria
User Interface:
The login page must have an email input field.
The email input field must validate the format of the email address.
Error messages must be clear and user-friendly.
Email Validation:
The system must validate the email format upon user input.
Invalid email formats must trigger an error message without proceeding further.
IDP Discovery:
The system must accurately discover associated IDPs based on the email domain.
If a single IDP is found, the user must be forwarded directly to the IDP login page.
If multiple IDPs are found, the user must be directed to a company login selection page.
Test Cases (DRAFT)
Test Cases for New User Login Flow
Test Case 1: Valid Single IDP Discovery
Description
Test the scenario where a user enters a valid email address associated with a single IDP.
Enter an incorrect password on the IDP login page.
Click on the "Login" button.
Expected Result
The system validates the email address.
The system discovers a single IDP.
The user is redirected to the IDP login page.
The user enters incorrect credentials.
An error message is displayed indicating the password is incorrect.
The user remains on the IDP login page to retry.
Architectural Relevance
The following items are ensured (answer: yes) after this issue is implemented.
In the context of the standards 126 and 127, typically only one is applicable, depending on the specific use case. Please cross out one of the two standards that does not apply.
This feature aligns with our current architectural guidelines
The impact on the overall system architecture has been assessed. The Feature does not require changes to the architecture or any existing standard? Please have a look here on the overarching architecture
Potential risks or conflicts with existing architecture has been assessed
Additional information
n/a
The text was updated successfully, but these errors were encountered:
Implementation of New User Login Flow - IdP Discovery
Overview
We are introducing a new user login flow for the Catena-X Dataspace. This flow will utilize IDP-Discovery, eliminating the need for users to actively select their Identity Provider (IDP). Instead, the system will manage IDP selection based on the user's email address. This new flow aims to streamline the user experience and improve the login process.
What's the benefit?
The new user login flow with IDP-Discovery brings significant benefits, including a more streamlined and user-friendly login process, enhanced security, and better management capabilities. It positions Catena-X Dataspace for future growth and scalability while contributing valuable improvements to the Keycloak community.
Implementation Details
Current Flow
New Flow (IDP-Discovery)
Impacted Products
What are the Risks?
None
Contribution Timeline
We plan to contribute the code for this new login flow within the next release scheduled for 25th June.
Benefits
Feature Team
Contributor
Committer
open
User Stories
Acceptance Criteria
General Acceptance Criteria
User Interface:
Email Validation:
IDP Discovery:
Test Cases (DRAFT)
Test Cases for New User Login Flow
Test Case 1: Valid Single IDP Discovery
Description
Test the scenario where a user enters a valid email address associated with a single IDP.
Precondition
Steps
[email protected]
).Expected Result
Test Case 2: Valid Multiple IDP Discovery
Description
Test the scenario where a user enters a valid email address associated with multiple IDPs.
Precondition
Steps
[email protected]
).Expected Result
Test Case 3: Invalid Email Address
Description
Test the scenario where a user enters an invalid email address.
Precondition
Steps
invalid-email
).Expected Result
Test Case 4: No IDP Found
Description
Test the scenario where a user enters a valid email address, but no IDP is associated with the email domain.
Precondition
Steps
[email protected]
).Expected Result
Test Case 5: Successful Login with Single IDP
Description
Test the scenario where a user successfully logs in through a single discovered IDP.
Precondition
Steps
[email protected]
).Expected Result
Test Case 6: Successful Login with Multiple IDPs
Description
Test the scenario where a user successfully logs in through one of the multiple discovered IDPs.
Precondition
Steps
[email protected]
).Expected Result
Test Case 7: Incorrect Password
Description
Test the scenario where a user enters an incorrect password.
Precondition
Steps
[email protected]
).Expected Result
Architectural Relevance
The following items are ensured (answer: yes) after this issue is implemented.
In the context of the standards 126 and 127, typically only one is applicable, depending on the specific use case. Please cross out one of the two standards that does not apply.
Additional information
n/a
The text was updated successfully, but these errors were encountered: