Single Logout (SLO) with external identity provider #472
Replies: 1 comment 3 replies
-
Correct. To set up federated sign-out, you indeed need to configure the front-channel logout URI in Entra ID in this case to end the session at the level of Duende IdentityServer whenever the user signs out from Entra ID, either directly or via App2.
To flow the logout event through to App1, your App1 client in Duende IdentityServer needs to be configured with either a back-channel logout or front-channel logout URI as well. This is what we mean when we say "automatically supported": Duende IdentityServer renders the You can find additional information about these client logout notifications in our documentation. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
We would like clarification on the expected single logout (SLO) behavior when using Duende IdentityServer with an external identity provider.
Setup
Scenario
Questions
From a design perspective, if the user logs out from App2 (directly at the external IdP), is it expected that this also logs the user out from IDSrv and, by extension, App1?
According to the Duende documentation on external sign-out notifications:
https://docs.duendesoftware.com/identityserver/ui/logout/external-notification
Federated sign-out is described as “automatically supported”, with IdentityServer rendering the necessary logout
<iframe>when it receives a federated sign-out request.Is our understanding correct that, in this model:
RemoteSignOutPathfor the external IdP in IdentityServer, andOnRemoteSignOut) is normally required?In our setup, when the external IdP initiates a federated sign-out, the IdentityServer session appears to remain active. We would like to understand whether this is expected by design, a limitation of the scenario (e.g. browser / mixed clients), or whether additional configuration is required.
PS: We have an active Duende license.
Beta Was this translation helpful? Give feedback.
All reactions