Overview of Claims-based Authentication

Claims-based authentication (CBA) is built on Windows Identity Foundation (WIF), a framework for building Windows-based, claims-aware applications and security token services (STSs) that is standards-based and interoperable. Interoperability is provided through reliance on industry standard protocols such as WS-Federation, WS-Trust, and Security Assertion Markup Language 1.1 (SAML).

In claims-based authentication, an identity provider, or security token service, responds to authentication requests and issues SAML security tokens that include any number of claims about a user, such as a user name and groups the user belongs to. A relying party application receives the SAML token and uses the claims inside to decide whether to grant the user access to the requested resource. Claims-based authentication can be used to authenticate your organization's internal users, external users, and users from partner organizations.

K2 relies on the configuration of a K2 user manager to provide authentication and user and group resolution for identity stores such as Active Directory, SQL, LDAP or a custom store. For more information see the topic: Introduction to User Managers.

K2 provides the ability for incoming claims-based authentication through configuration of mappings between claims-based identity providers and K2 user managers. For more information, see the Claims References topic.

For information on how to configure K2 Services to support Claims Authentication, see KB001426

Do not register multiple security labels against the SSPI (Windows Security Provider). Doing so will result in users being resolved incorrectly.

Claims-based Authentication needs to be configured and working on the K2 blackpearl server before starting the claims configuration for K2 smartforms sites.

Known Supported Scenarios

The following Claims-Based Authentication (CBA) scenarios are known to be supported. Note that this list is not exhaustive since there may be other CBA scenarios that will also work.

When Windows STS authentication OR Forms STS authentication is enabled, it is important to frequently save work that has been done in the K2 Designer as work might be lost when the same session is left open for 8 hours or longer.