Skip to main content
Skip table of contents

CAS/SSO (FT-1008.006)

About this document

Scope

This document provides background information as well as a functional description of the FT-1008.006 CAS/SSO standard feature. The described feature is supported from the release version 4.3.5 onward.

Note

CAS/SSO is a standard feature and does not require a special license.

This feature is part of the User Management functionality with number FN-1001.

Feature Availability

Feature Version

Available from

Summary of changes

v1

CMP Release 4.3.5

Initial release 


Feature overview

Scope

The scope of this Feature Description is to capture the new functionality of the CMP CAS/SSO Solution.

Unless mentioned explicitly, the features described are available in the current implementation. Features not available now are marked as ‘(planned for further CAS versions)’.

Goals

The CMP CAS/SSO Solution covers the following main functionality:

  1. Centralized Identity and Access Management for all CMP Portals.

    1. This replaces the local User Management in EP, RM, and BM.

    2. Consistent context-based User Access Management across all CMP components (Web Applications and API access).

  2. CMP Single Sign-On functionality for all CMP Web Applications (EP, RM, BM, and CMP CAS User Management Application).

    1. User login procedure redirects to one common login screen that authenticates and authorizes CMP Users via the Central Identity Management (see above).

    2. Implemented via state-of-the-art OAuth 2.0 authorization protocol for CMP.

  3. Centralized API authentication/authorization for all CMP API domains (Enterprise Portal, Resource/Account Management, Billing Management APIs).

    1. Implement OAuth 2.0 authorization mechanism for API access.

    2. Maintain a basic authorization mechanism for API access.

  4. Establish a CAS Server Infrastructure that utilizes Centralized Identity Management and enables the following core functionalities:

    1. Integration capabilities to external IAMs (IdMs) via OAuth 2.0 Access delegation.

    2. Support of state-of-the-art standards for user authentication and authorization.

Out of Scope

  • SSO integration to external IAM(s) via authorization federation, e.g. to LDAP or Active Directory.

  • Other authentication/authorization protocols than OAuth 2.0, specifically, SAML, OpenID, and OpenID Connect are not supported in the current version of the CMP CAS.

  • Other User Database integrations than CMP internal CAS Database, Directory Services like LDAP or Active Directory are not supported.

Preconditions & Assumption

  • Optional feature for SSO Integration to external IAM(s) is available.

Functionality of the feature

Apereo CAS Server

The CMP CAS Solution is built around the Apereo CAS Server reference implementation of the CAS Protocol (see https://apereo.github.io/cas/6.2.x/index.html for a detailed description).

The following diagram from the Apereo website (see https://apereo.github.io/cas/6.2.x/planning/Architecture.html) shows which components of the Apereo Standard Architecture are used to fulfill the goals of the CMP CAS solution listed above:

CMP CAS solution Standard Architecture.png

Mapping of Apero CAS architecture to CMP CAS solution

  1. The standard OAuth 2.0 protocol integration capabilities are used to enable SSO for all CMP Portals and API access. In this case, the CMP Web Applications act as CAS Clients.

  2. The same standard capabilities are used to delegate authentication/authorization via OAuth protocol to external IAMs to support various SSO integration scenarios.
    In this case, the standard authentication flows have to be adapted to enable the different user authentication/authorization scenarios.

  3. South-bound the Apereo CAS Server is integrated into a Central CMP CAS Database.

The following elements supported by the Standard Apereo CAS framework are currently not used by the CMP CAS Solution and correspondingly out-of-scope (see as well mapping in the diagram above):

  • Other protocols than OAuth 2.0, specifically, SAML, OpenID, and OpenID Connect are not supported in the current version of the CMP CAS.

  • Other User Database integrations than CMP internal CAS Database, Directory Services like LDAP or Active Directory are not supported.

If required in the future CMP CAS features might be extended - based on the native capabilities of the Apereo CAS Implementation.

CMP CAS Solution Design

As a summary, the CMP CAS Solution consists of the following components:

  1. The CMP CAS Server based on the Apereo CAS Implementation Framework (see above),

  2. the Central CMP CAS Database replacing the Local User Information stored in EP, RM, and BM, and

  3. the CMP User Management Application to manage the Centralized User and Access Information.

The following diagram sketches the different components and related interactions that make up the CMP CAS Solution:

CMP CAS Solution.png

CMP CAS Architecture overview

The following chapters provide a more detailed overview of the functions and characteristics of the various components of the CMP CAS Solution.

CMP User Management Application

The MAVOCO CMP CAS User Management Application is a web application (based on the Siena GUI design) that is used to manage Users, User Groups, Access Rights, Templates for Access Rights, and for User Notifications. It can be used for CMP Software Components starting with the CMP version 4.3.5 or higher.

Basic Concepts of CMP User Management

  1. CAS User:

    1. A CAS User is a person who utilizes the CMP Software (via UI a/o API). The User Is related to an Identity that can exist In the CMP CAS System or can be provided by an external System (SSO integration via authorization delegation). → See the definition of delegated and local users below.

    2. CAS users have the following life-cycle:

      User lifecycle_2.png

    3. The described states have the following meaning:

      • Draft: Information entered for the user in this status can still be discarded, the User will be removed from the database. Draft users are not allowed to access any CMP module.

      • Active: Once activated a user is entitled to access CMP systems according to its authentication and authorization settings.

      • Inactive: Deactivation of a user blocks its access to CMP modules. Inactive users can be set back to Active at any time, given the user - performing the reactivation - has sufficient access rights.

        • Remark: Deactivation of a user will take effect with the next login attempt or after token timeout (in case the user is logged-in during activation)

      • Deleted: Deleting a user anonymizes its data without deleting the user in the database. References to the anonymized user record, e.g. in the audit log information are kept. Deleted users cannot be re-activated.

        • Users in this status can be archived after a given retention period (planned for further CAS versions)

  2. Local and Delegated users:

    1. In an SSO integration scenario, Users - before getting authorized by the CMP CAS solution - may be authenticated via an external IdM (Identity Management System). Such users are defined as ‘Delegated’.

    2. In contrast, standard CAS Users authenticated and managed completely in the CAS environment are called ‘Local’ Users.

  3. User Domain:

    1. Allows to group users in different categories with similar behavior and semantic. By default the following 2 user domains are set-up (can be extended)

      • CSP

      • ENTERPRISE

    2. Users belonging to the same user domain share the following information:

      1. Applied rule for user creation: The following diagram depicts the standard restrictions for user creation related to the standard User Domains:

        User Creation logic_2.png
      2. Whether a user is local or delegated (or federated - for future use), this information is a property of the user domain

  4. The (User) Context:

    1. The main task of the Siena CAS application is to give a User right to functions and access to objects.

    2. Functions are controlled via ACL, there is a corresponding ACL for each function. These are maintained by MAVOCO and the list of ACL is expanded with every new feature.

    3. Access to objects depends on the context of the User. Users can be

      1. CSP Users who have access to almost all objects,

      2. Account Users that can only see their own objects

      3. Users of Groups or even Customers of the Accounts who can only see a subset of the Account data.

    4. The following Context Types are supported by CMP CAS, which also form a hierarchy:

      1. Root: Marks the highest/root level of the Context hierarchy. Remark: The name of this Context Type has been changed to ‘Root’ (formerly called ‘CSP’) to avoid confusion with the CSP User Domain

      2. Tenant: for MVNOs, Resellers or to supporting MNO own access hierarchies: (planned for further CAS versions)

      3. Account: Remark: Sub-Accounts are on the same context levels, there is no distinction between Accounts and their Sub-Account from a Context Management point of view

      4. Account-Customer (planned for further CAS versions)

    5. A CAS User can have different Roles and can have access rights (ACL) in more than one Context.

  5. Context Switch:

    • As an example, a User can be an Administrator both for Account A and Account B. The CMP software will not show all Objects in one data grid. If a User needs to switch from one Account to another Account, a Context Switch needs to be done. Accordingly, the content of the software will be adapted.

  6. Access Rights and ACL:

    1. For each CMP module (EP, RM, BM, and CAS-UM) there is a predefined list of access rights that allow to specify functional rights for CMP users.

    2. Examples (module / access right name / data type):

      • portal / ‘SIM - Price Plan Modify’ / boolean: Allows a user - if set to true the user - to modify Price Plans for SIM in the EP (= module)

      • cas / ‘CAS users - Create or Modify’ / boolean: This access right allows to change and create new users on the CAS-UM module

    3. Remark: Although ACL (Access Control List) literally defines a list of access rights, in the context of CMP it's used both for a list of rights and one single right (= access right) in the ACL

    4. Access Rights (ACLs) within a module are grouped into categories to show functional dependencies between rights and to simplify search processes. Examples:

      • Category ‘SIM Cards’ in module ‘portal’ to group all access rights related to changes on a single SIM Card

      • Category ‘User Management’ in module ‘cas’ to group all access rights related to user Management functionality

      • Remark: There is a specific Type of ACLs, which are not used for managing user access rights. Although using the ACL mechanism, ACLs in the category ‘User Preferences’ are specifically used to store the user’s preferences in relation to a module (e.g. ACL portal / 'Dashboard Panels' / Text for storing the user-specific dashboard settings in a text field). Correspondingly ACLs in this category are not visible when defining ACL templates, User Groups, or retrieving Effective User Rights for a user.

    5. The vast majority of access rights are from type Boolean, thus they simply indicate whether a right is granted to the user (value = true) or not (= false). Currently, there is one Access right from type ‘Text’ defined (Module: ‘portal’ / Category ‘API’): ‘API IP Allow’. For this ACL the following rules apply:

      1. if not assigned the user CAS user will not be able to perform API calls at all. This follows the general logic for Boolean user rights: if not assigned the corresponding right is considered as false = not allowed. Consequently removing a once granted IP range can be achieved by removing the 'API IP Allow' access right (supported in the newest CAS-UM and EP version).

      2. If assigned

        1. with value ‘0.0.0.0/0’ means no validation is performed - user with this value will be able to use API calls

        2. with an IP range different from '0.0.0.0/0' the corresponding validation will be performed. This means only users with IP-address within the given range will be allowed to perform API calls

  7. Rules for CMP Module Access (status v.4.3.5):

    1. The following CMP Modules support Users with access on Root and Account level: Enterprise Portal (EP) AND CAS-User Management (CAS-UM)

      • That means any CAS user can access these Modules regardless if he’s assigned to Root or one or many Account Contexts.

      • The functions and data that are visible to the user will depend on the access (for example, root user can see all account, account user only specified accounts)

    2. In contrast, the CMP modules Resource Manager (RM) and Billing Manager (BM) currently only grant access to CAS users having access to the Root level. Users assigned on Account level are not supported and don’t get access to these modules.

      • Additionally for Billing Manager access the Access Rights ‘bmModuleAccess’ must be enabled for the respective CAS user

  8. Effective User Rights:

    1. To answer the question, if a User has access to a specific function (described by an ACL), in a given context, the evaluation of several user rights related concepts (see below) is required. The result of the evaluation - computing the rights according to the defined evaluation steps - defines the Effective User Rights of a given User in a given Context. Remark: Effective User Rights only make sense in combination with a context, Effective User Rights without context are useless.

    2. Effective User Rights are 'evaluated' (calculated) every time a) the user logs in to a CMP module or b) the context of the user has been switched.

    3. In order to support mapping of user role definitions in external IdMs to CAS access right concepts, the effective rights calculation for delegated users comprises more evaluation steps (see e.g. step e1 below) than for local users. Steps only applicable for delegated users are marked accordingly in the following section.

  9. Effective User Rights Evaluation steps

    1. To calculate the Effective User Rights of a CAS User in a Context the following steps are performed:

      • e1 (only applicable for delegated users) - In case the user is provided with an external role name (via external authentication flow) AND the Context has a User Group assigned with a matching Role name’, transfer the User Group settings to the Effective User Rights of the user. Remark: To take User Group settings into account it is sufficient that role names match, the user does not have to be assigned to the User Group (in contrast to step e2).

      • e2 - In case the user is assigned to one or many User Groups in the Context, write the settings to the Effective User Rights list. For more than one User Groups the evaluation will follow the alphabetical order (User Group Name), later access rights will overwrite earlier User Group rights - or access rights remaining from step e1 (only for delegated users).

      • e3 - (not used currently) Finally, access rights assigned to CAS User directly overwrite Effective User Rights calculated in steps e1. Remark: Experience shows that the functionality to define user-specific access rights - deviating from context Access Policies or User Group definitions - was rarely used. Thus, this option has been disabled for the time being.

    2. Generally all access rights not assigned on a level (User Group, User) are considered as false = not allowed. Consequently, each access right not appearing in any of the evaluation steps is considered false when calculating the Effective User Rights for a user.

    3. Remark: A user right not assigned is as well called ‘inherited’ as it ‘inherits’ its values from previous evaluation step (if applicable). So 'Inherited' is NOT an ACL value but an indication that the ACL is not assigned, thus the value is by default considered as false (see above).

  10. Context Access Policy:

    1. Assigning user access rights directly to a context (Root or Account) defines a standard set of access rights, the so-called Access Policy. The Access Policy allows to limit the available access rights for a given Context to a restricted subset, providing additional filter functionality when calculating effective user rights (planned for further CAS versions).

  11. User Groups:

    1. User Groups have been a well-known concept in CMP and have been transferred to the CMP CAS solution.

    2. By assigning a User to a User Group the user ‘inherits’ the Group's access rights. This allows to define a local (context-specific) combination of access rights that can be used by all users in the related context.

    3. It is possible to assign a user to more than one User Group in the respective context. In this case, the Effective User Rights will be calculated in alphabetical order (see above).

  12. ACL Templates:

    1. Assigning Access Rights to Users, User Group, or a context (as Access Policy) individually is very time-consuming, as there are already hundreds of different ACLs defined. To simplify the management of user rights the concept of ACL Templates has been introduced. It replaces the one-by-one assignment and setting of ACLs - as required in the past - by copying the ACLs of the ACL Template in one step.

    2. With ACL Templates a CSP can easily assign pre-defined combinations of access rights in a short time. It enables the definition of standard sets of access rights and accelerates the allocation of rights.

    3. During the usage of an ACL Template the related access rights are copied to the corresponding entity (User Group or Context). This means any subsequent change to an ACL template does not impact the settings of any User Group or context the Template was used with.

The following logical data model shows the entities described and how they are related to each other:

basic concept of CMP user management.png

User Management Use Cases

The following table lists all User Management Use Cases that are supported by CMP User Management Application (CAS-UM) and the relationship to corresponding functions in the various CMP Portals.

User Management Use Case

Description

Transferred from Portal(s)

Manage CAS Users

  • Create and Change User Information

  • Add Personal Information to Users

  • Deactivate / Activate Users (see User life-cycle above)

  • Anonymizing data of inactive users by setting to ‘Deleted’ status (see User life-cycle)

  • Change Assignment of Users to Context

  • Change Access Rights for Users via Assignment to a User Group

Enterprise Portal (EP):

  1. Add and manage local Portal Users

  2. Remarks:

    1. The current re-direction to CAS-UM for creating and managing Portal users as CSP or Account Admin replaces the local user Management functions that were available in Enterprise Portal.

    2. In the future these functionalities will be re-introduced in Enterprise Portal to avoid user redirection from EP GUI to Siena based CAS-UM GUI (see Section ‘Portal Use Cases related to CMP CAS’ below).

Resource Manager (RM):

  1. Add and manage local Resource Manager Users

    1. Adding Users in RM GUI is not be possible anymore and needs to be done via CMP CAS Management Application (CAS-UM).

Billing Manager (BM):

  1. Billing Manager has no GUI for User Management, the related functions are transferred to the CMP User Management Application (CAS-UM).

Password Management

  • Change Password

  • Reset Password via Login Screen

  • Reset Password for other users (planned for further CAS versions)

Enterprise Portal (EP):

  1. Change Password function in user Menu

    1. The Change Password function behaves differently for local and delegated user (see Section ‘Portal Use Cases related to CMP CAS’) below

  2. Reset Password via Portal Login Screen

    1. The Portal login screen is replaced by a common login screen for all Portals that provides a unified Reset Password function

  3. Reset Password functions on EP Portal user list (planned for further CAS and Portal versions)

    1. The Change Password function behaves differently for local and delegated user (see Section ‘Portal Use Cases related to CMP CAS’ below)

Resource Manager (RM):

  1. Point 1 to 3 from above apply as well for the RM Portal functionalities

Billing Manager (BM):

  1. Billing Manager has no GUI for User Management and the existing functions are transferred to the CMP CAS User Management Application.

Manage Contexts and User Groups (Organization Unit Access)

  • List/search Contexts (Root and ACCOUNT level)

    • Tenant and Customer level (planned for further CAS and EP versions)

  • Assign/remove User to/from Context

  • Manage User Group for Context

    • Assign ACL Template to defined Group rights

    • Assign/remove users to/from UG in context

    • Delete User Group

  • Assign ACL template to context to define context access policy

Enterprise Portal (EP) & Resource Manager (RM):

  1. Manage User Groups for Account (EP) or Root level (RM)

    1. Define Access Rights for User Groups

    2. Remark: The manual assignment of Access Rights (ACLs) one-by-one to User Groups is replaced by the assignment of a corresponding ACL-template to define Groups Rights

  2. Assign/remove Users to/from User Group in Context

Manage ACLs

  • View ACLs and Assignment to Modules

 

Enterprise Portal (EP) & Resource Manager (RM):

  1. View ACLs for the own Module (EP or RM)

    1. Remark: Replacing the Local User Management by a central function requires the introduction of the attribute ‘Module’ to determine the module (EP, RM, or BM) to which the ACL entry is applicable.

Manage ACL Templates

  • Create/Edit ACL Templates

  • Manage Assignment of ACL Templates to the corresponding Context Types

  • Import/Export ACL Templates

    • Allows the import and export of ACL Template information in *.csv-format

  • Delete ACL Templates

No existing functionality in CMP Portals.
ACL templates have been introduced as a new concept with CMP CAS solution.

Manage Messaging Templates

  • create and edit Massaging Templates (planned for further CAS versions)

Enterprise Portal (EP), Resource Manager (RM) & Billing Manager (BM):

  1. Messaging Templates for different use cases (etc. ‘Password Reset’) have been setup and configured for each Portal separately via direct Portal DB access.

  2. In a first step the existing Templates and related data structures have been moved to the central CAS Database.

  3. In a second step the the management function performed directly in the CAS database will be replaced by a corresponding management GUI in CAS-UM (planned for further CAS versions)

CMP CAS Server

SSO Integration Aspects

 The CMP Software can exist completely without an external IdM system. However, in many cases, the CSP has an existing IAM and especially wants to offer internal users a single-sign-on user experience.

The integration of external parties like customers makes the whole process much more complicated and fragmented. In most cases, portals for private customers do not play a major role in systems like our CMP, however, the CSP could have existing portals for business customers.
Another use case could be the merging of different CMP Platforms, for example, customers who have an Account in Jasper could also register with the same identity to our CMP Software.

CMP CAS Solution currently supports SSO integration via authentication delegation (via OAuth 2.0) and SSO integration to external IAMs via authorization federation is out-of-scope.

SSO integrations based on CMP CAS solution

The following diagram summarizes

  1. the required CMP CAS components,

  2. the related CMP CAS standard functionality (see CMP CAS Architecture), and

  3. the functionality that requires integration services for an SSO integration.

SSO integrations based on CMP CAS solution_2.png

CMP CAS SSO integration components

SSO Integration Services

CMP CAS Component

Purpose

Comment

CSP Auth Flow (for delegation)

CMP CAS Server

CMP Provides default login flow only (see below) based on CMP User Database and CMP Login Screens.

For CSP having its own process, CSP CAS Service flows have to be configured.

This is the main customization service for integration to external IAMs.

CSP Role Mapping

CMP User Management Application

CMP provides its own User and Access Rights Management web application (='CMP User Management Application').

Initial setup is required to enable access to CMP Services:

  • Create Global User Groups and assign ACL Templates,

  • Define CSP User Roles and assign these Roles to Global User Groups,

  • Optionally define Context wide (Account) Groups and assign Roles there.

This is required if external IAM is based on authorization via Roles.

CSP IAM Plugin

CAS PAC4J (Delegation)

CMP CAS uses the PAC4J framework to delegate authentication.
A new Plugin is required in case external IAM requests new token encryption and signature verification method not supported by CMP CAS.

Currently supported token encryption and signature verification (RAS/RS256):

  • Token Encryption: RSA (for Asymmetric key pair generation) with at least 2048-bit keys.

  • Signature Verification: RS256 (RSA Signature with SHA-256).

The PAC4J project provides some standard plugins for the most common platforms (see https://www.pac4j.org/docs/clients/oauth.html).

CMP Portals

The introduction of a centralized CMP CAS Solution supporting SSO requires the following migration/development tasks on each CMP Portal:

  1. Implementation of SSO for each Portal.

  2. Replacement of the local User Management functions by access to the centralized User Management functions (via User Management API).

  3. Migration of the local User Information to the centralized CMP CAS Database (only EP and RM in the first version).

Single Sign-On for all Portals (EP, RM, and BM)

The following diagram shows the standard sequence of OAuth API calls for SSO implementation on each Portal (see as well the diagram for CMP CAS Architecture above):

Single Sign-On for all Portals.png

Standard CMP SSO authentication flow

Authentication via the local login screen is replaced by redirection to the common SSO login screen for the CMP CAS Solution.

This replaces local authentication and authorization by CAS SSO and is applicable to all CMP Portals (EP, RM, and BM), also including the CMP User Management Application.

Portal Use Cases related to CMP CAS

Local User Management functions are replaced by access to the centralized User Management (via User Management API).

  • In the first version, this will only be implemented for Enterprise Portal and Resource Manager, Billing Manager will follow in a later version.

As a general rule, all functionalities currently available via local User Management must be available after migration to the CMP CAS Solution (either via CAS User Management or via adapted EP or RM Portal functionality).

Note: This does not imply that the application and the corresponding UI will NOT change.

  • Some functionalities for managing Users locally are replaced by corresponding functions in CMP User Management Application.

  • Some functions will only be available in read-only mode.

Portal Use case

Impact of CMP CAS Solution

Context Switch

Enterprise Portal (EP):

  1. Context Switch functionality remains in EP, but the UI design will be adapted to the extended number of Context Types.

  2. Context switch supports now following search functionality:

    1. Search / filtering by Account name and number

    2. Search / filtering by Accounting Group (planned for further CAS versions)

Resource Manager (RM) & Billing Manager (BM):

  1. Not applicable.

Create Groups (SIM-Groups) in EP

Enterprise Portal (EP):

  1. Management of the SIM-Groups remains locally in EP, means no migration to a centralized CAS functionality

  2. Groups (=SIM-Groups) are not be translated to a specific Context Type in CMP CAS, and the concept of Groups in Enterprise Portal will gradually be replaced by the ‘Customer’ Context Type. As a consequence, there is no possibility to create Users on SIM(-Group) level anymore.

Resource Manager (RM) & Billing Manager (BM):

  1. Not applicable.

Create User Groups

Enterprise Portal (EP) & Resource Manager (RM):

  1. Creation and modification of User Groups is removed from both Portals and is only be available via the CMP CAS User Management Application.

Manage Users in Portal

Enterprise Portal (EP):

  1. The initial re-direction to CAS-UM for creating and managing Portal users as CSP or Account Admin has been replaced (from Feature Description v0.8 on) by the re-introduced local user Management functions (see next points).

  2. Functions re-introduced in Enterprise Portal to avoid user re-direction to CAS-UM from EP GUI:

    1. List all Users for current Context (and users one context level below if applicable)

    2. Create user in own context (or in another context, if logged in user is entitled to do so)

      1. Assign/remove existing user to/from context, in case logged in user has access to more than one context

    3. Functions available for selected users in user List:

      1. Discard, activate or deactivate and delete user according to defined User life-cycle (see above)

      2. Change User Profile (including Personal information and Avatar)

      3. Show Organization Unit Access

      4. Change user access rights via assignment to one (or many) User Group(s) in context

      5. Show Effective User Rights per context (analog to CAS-UM)

  3. Remarks:

    1. These functions require sufficient Admin Rights as Account Admin or Portal Admin (logged-on User assigned to Root level)!

    2. Delegated Users - managed in an external IdM - are read-only and cannot be created or changed via Portal functions (analog to CAS-UM)

    3. The EP User Management comprises a subset of all CMP User Management functionalities. Functions not available or applicable to Enterprise user - like the management of ACL-Templates, User Groups or Context Access Policies - are only available via CAS-UM GUI. In case a CMP user needs access to these extended user management functions - not available in Enterprise Portal - he has to login to CAS-UM GUI directly.

Resource Manager (RM):

  1. User creation functionality via RM GUI is removed and only possible via the CMP CAS User Management Application (user will be redirected to CAS-UM GUI).

Billing Manager (BM):

  1. Not applicable.

'Forgot Password' on Enterprise Portal Login Screen

Enterprise Portal (EP):

  1. ‘Forgot Password’ option is replaced by the corresponding ‘Reset Password’ function at the common CAS SSO login screen for all Portals.

Resource Manager (RM) & Billing Manager (BM):

  1. Not applicable.

Show Profile

Enterprise Portal (EP) & Resource Manager (RM):

  1. Show Profile function for Local CMP Users:

    1. Profile is read from CMP CAS Database and presented in read-only mode

    2. Effective Rights of the logged-in User are shown in the User Profile Dialog (planned for further EP versions)

  2. Show Profile Function for Delegated CMP User:

    1. User is re-directed to the corresponding screen of the external IdM.

Billing Manager (BM):

  1. Not applicable.

Change Password

Enterprise Portal (EP) & Resource Manager (RM):

  1. Local Users:

    1. Function is available via EP GU and does not require re-direction to CMP CAS User Management Application.

  2. Delegated Users:

    1. Change Password function redirects the User to the corresponding screen of the external IdM.

Billing Manager (BM):

  1. Not applicable.

Reset Password

Enterprise Portal (EP):

  1. Reset Password option is available for Local CMP Users from the User List (planned for further EP versions). → See table entry ‘Manage Users in Portal’ above.

Resource Manager (RM) & Billing Manager (BM)

  1. Not applicable.

User Management APIs exposed for external use

  1. Read CAS User

  2. Create CAS User

  3. Assign Person to User

  4. Create User Group

  5. Change User Group

  6. Assign User to a User Group

2FA

Two-factor authentication provides an additional layer of security for User accounts by requiring a second step of verification at sign-in. In addition to using the login name and password to log in, the User has to enter a one-time password sent to them via SMS or email, depending on the configuration of the respective User.

CMP supports two channels for 2FA: SMS and email. SMS and email as 2FA token channels can be set independently from each other. The possible configuration options are:

  • SMS only,

  • email only, and

  • SMS and email.

Note that this capability is dependent on integration into SMS and/or email server.

General 2FA settings provided by CMP can be overwritten for specific Users in the User Profile by the Admin User with a specific User Right. The available values for User 2FA settings are the following (depending on the available features):

  • disabled,

  • SMS,

  • email, and

  • SMS and email.

2FA token SMS is sent to the User’s phone number specified in the User Profile. Filter mechanism allows to block SMS in case the User MSISDN doesn’t match a given pattern. In case the token SMS is blocked, corresponding feedback is displayed during the login process.

2FA token email can be sent in CMP default language (i.e. English) or the User’s preferred language that is defined in the User Profile. The email is sent to the User’s email address specified in the User Profile.

The minimum length of the sent 2FA token is 6 digits and the lifetime of the token can be configured on the CMP instance.

CMP instance can be configured to only send OTP token when the User logs in for the first time; otherwise, the token is sent with each login. CMP stores the timestamp of the first successful User login in order to allow that.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.