Basic settings
Click Authentication in the Settings menu if you want to view or change the basic authentication settings.
ROLES & PERMISSIONS:
To see the Authentication menu item, you must have ADMIN permission for the “Tenant management” permission type or be the first admin user created in the tenant.
For easier user access management, the above permission(s) are/is included in the global role(s) created by default in every new tenant:
- Tenant manager - manages tenant-wide configurations like applications, tenant options and retention rules.
Login settings
In the Preferred login mode field, you can select one of the following options:
- OAI-Secure - recommended, since it provides high security, using authorization tokens to prove the identity of the user. Default login mode on creating new tenants. This mode is an enhancement of the previous OAuth Internal authentication (available prior to 10.13.0).
- Basic Auth - should be selected only for specific compatibility reasons, since it only provides basic security.
- Single sign-on redirect - can be selected only if SSO is configured. If selected, will remove Basic Auth and OAI-Secure login options.
This login mode will be used by the platform’s applications as the default method to authenticate users. Device authentication stays unchanged.
In the field Password validity limit, you can limit the validity of user passwords by specifying the number of days after which users must change their passwords. If you do not want to force your users to change passwords, use “0” for unlimited validity of passwords (default value).
By default, users can use any password with eight characters or more. If you select Enforce that all password are “strong” (green), users must provide strong passwords as described in To change your password.
The Ignore case when logging in toggle allows enabling or disabling case sensitivity for the username or alias when authenticating a user login. If enabled, this feature is applied to all tenant users. By default, the feature is disabled.
Basic Auth restrictions
Even if OAI-Secure authentication is configured for users, basic authentication remains available for devices and microservices using the platform. To provide a higher security level the basic authentication can be restricted.
Use the Forbidden for web browsers toggle to disallow the usage of basic authentication for web browsers. Moreover you can specify the following parameters:
- Trusted user agents - this list is empty by default. If some user agent is added, all the HTTP requests containing this entry in the
User-Agent
header and having a valid basic authentication date will be accepted. - Forbidden user agents - this list is empty by default. If some user agent is added, all the HTTP requests containing this entry in the
User-Agent
header and using basic authentication will be rejected.
OAI-Secure session configuration
OAI-Secure is a more secure alternative to the Basic Auth mode that also supports username and password login. In OAI-Secure mode the credentials in the initial request are exchanged for a JWT token that is set as a cookie in the web browser or returned in the response body. Based on the configuration OAI-Secure can support full session management or work as a standard JWT authentication where the user session lifetime is limited by the token expiration time.
OAI-Secure without the configuration related to the session management (session configuration turned off)
When there is no configuration related to the session, OAI-Secure issues a JWT token with a certain lifetime. If the token expires then the user is forced to re-login because token refresh is not supported. This behavior is very inconvenient for the user if the token lifetime is short because the user is forced to re-login frequently.
OAI-Secure with the configuration of the session management (session configuration turned on)
Using OAI-Secure with session configuration is more convenient and secure, and can be used to achieve a behavior which is similar to the authentication based on HTTP sessions.
The OAI-Secure token acts as a session identifier on the client side (web browser). Such a token identifier which is stored in the cookie can have a preconfigured short lifetime. Then, the Cumulocity IoT platform is responsible for renewing the session identifier without any user interaction. It is sufficient that the user’s action causes the web browser to send a request to Cumulocity IoT. Then, Cumulocity IoT can examine if the renewing of the session identifier should be executed and perform the operation if necessary. Cumulocity IoT offers extensive configuration related to this behavior so that tenant administrators can adjust the configuration to their needs.
If the Use session configuration option is enabled, the following settings can be configured on tenant level by a tenant administrator:
Field | Description | Default |
---|---|---|
User agent validation required | If turned on, the user agent sent in headers of consecutive requests in the scope of one session will be compared and a request with changed user agent will not be authorized. | false |
Session absolute timeout | Defines the maximum period of time that the user can use Cumulocity IoT without having to re-authenticate. | 14 days |
Session renewal timeout | Expected to be much shorter than the absolute timeout. Defines the time after which Cumulocity IoT tries to provide a new token (session identifier). The renewal may take place only when Cumulocity IoT receives an HTTP request from a client with a non-expired token and the period of time between obtaining the token and the execution of the request is greater than the renewal timeout. | 1 day |
Maximum parallel sessions per user | Defines the maximum number of sessions which can be started by each user (for example on different machines or browsers). When a user exceeds this limit, then the oldest session will be terminated and the user will be logged out on this particular device. | 5 sessions |
Token lifespan | Defines the time for which a token is active. The user is only able to access Cumulocity IoT with a valid token. This configuration option is always available, it does not depend on session configuration. See Token generation with OAI-Secure below. | 2 days |
The time parameters should depend on each other in the following manner: renewal timeout < token lifespan < absolute timeout. Moreover, the renewal timeout should be approximately half of the token lifespan.
Therefore, the recommended settings for a standard use case for OAI-Secure are the following:
- Session absolute timeout: 28 800 seconds (8 hours)
- Session renewal timeout: 2700 seconds (45 minutes)
- Token lifespan: 5400 seconds (90 minutes)
In such configurations, the idle timeout is in the range of 45 to 90 minutes, depending on when the last activity for the session was performed.
During the session token renewal the previous token is revoked and a new one is provided. The parameter renewal token delay
defines the delay used to make this process smooth and not disturbing for the user. The old token is still valid for this period (1 minute by default). This way both tokens, old and new, are accepted by Cumulocity IoT. This parameter is only configurable on platform level and cannot be modified by the tenant administrator.
Token generation with OAI-Secure
OAI-Secure is primarily based on JWT stored in a browser cookie. It can be also used to generate JWT in the response body.
The lifespan of the tokens and the cookie is configurable by tenant options belonging to the category oauth.internal
.
Lifespan configuration of JWT stored in the cookie
JWT tokens stored in the browser cookie have a default validity time of two weeks. This can be changed with tenant options:
- category:
oauth.internal
; - key:
basic-token.lifespan.seconds
;
The minimum allowed value is 5 minutes.
Lifespan configuration of cookies
Cookies used to store a JWT token in a browser have their own validity time that can be changed with tenant options:
- category:
oauth.internal
; - key:
basic-user.cookie.lifespan.seconds
;
The default value is two weeks. To have the cookie deleted when the user closes the browser, set it to any negative value.
Lifespan configuration of JWT in response body
The lifespan of JWT tokens generated in the response body is configured with the following tenant options:
- category:
oauth.internal
; - key:
body-token.lifespan.seconds
;
Refer to the Tenant API in the Cumulocity IoT OpenAPI Specification for more details.
TFA settings
Select the checkbox Allow two-factor authentication if you want to allow TFA in your tenant (only possible for administrators).
You may select one of the following options:
-
SMS-based, supporting the following settings:
- Token validity limit - lifetime of each session in minutes. When the session expires or a user logs out, the user must enter a new verification code.
- Verification code validity limit - here you can set the lifetime of each verification code sent via SMS. When the verification code expires, the user must request a new verification code in order to login.
Note that an SMS gateway microservice must be configured for the tenant. Naturally only users with a valid phone number associated can use this functionality. -
TOTP (Time-based One-Time Password) supporting the following setting:
- Enforce TOTP two-factor authentication on all users - when enabled it will force all users to set up their TFA on login. Otherwise each individual user can choose to activate it or not.
Note that the TOTP method is only available with the login mode “OAI-Secure”.
Click Save TFA settings to apply your settings.
- Each time you change the TFA method you will be forced to log out. User TFA settings are cleared and must be configured again.
- Users with a “devices” role are excluded from TFA and TOTP. This is also true when TOTP is enforced for all users.