Iframe Session Monitoring
This guide is designed to help you implement the Relying Party (RP) side of Session Management using two iframes.
- Diagram of the flow
- Implementation as the Relying Party
At the core of it, there should be two iframes included on your website's html page that are communicating back and forth to determine if the session state has
changed. If it detects a change, the RP will need to make an Authentication request with the request parameter
prompt=none to determine if the user is still
logged in. You can read the specification in further detail about Session Status Change Notification.
Diagram of the flow
The steps described below will occur once the session has already been established at the RP and OP.
- RP iframe calls postMessage() which sends data to the OP iframe to check the session state.
- OP iframe will respond
errordepending on the current state. (OP browser state matches what is expected)
- Steps 1 and 2 will occur at a given interval to continue monitoring session.
- When the session on the OP ends either via timeout or some user action, the state is changed to reflect it. (OP browser state is updated)
- Meanwhile, the RP iframe has continued to repeat step 1 and 2 and it will detect that something has changed.
- RP makes an Authentication request with
prompt=noneto the OP to determine if they are still authenticated.
- If so, the RP should store the new
- If Step 6 results in a
login_requirederror, RP should invalidate the RP session in their application, clear any local storage (idToken, session_state).
- End user notified of logout
This scenario also supports multiple RP's that exist within the same User Agent that share an OP as the session can be valid for multiple RPs simultaneously. If one logs out, the checkStatus interval will trigger the other to also log out.
Implementation as the Relying Party
You will need to embed the two iframes into your pages to monitor the session state of your users. Onegini as the OP, has provided an endpoint to get the html
for the OP iframe. It is located at
/oauth/v1/checksession of the OP server. You can see an example of the html with comments in
OpenID Provider iframe. The RP iframe is responsible for calling the
of the OP iframe with the necessary arguments.
Getting session_state from the Authentication Request
Example query string response implicit flow on Authorization endpoint
When making the authentication request to the OP, a
session_state value will be returned on the Authorization endpoint. The RP should first validate
the ID Token that is returned and if valid, store the
able to access it. It will need to send it to the OP iframe as part of checking the session state.
Read more about creating and updating sessions.
Session State in a cookie
Using a cookie to store the session state value is probably the most common approach, but it should be named uniquely to avoid being overwritten.
session_state value is modified locally, it will trigger a status change resulting in network traffic as it is directly coupled to the browser
state in the OP. Cookies are shared on a per domain basis so take extra care if you wish to host multiple RPs on a single domain.
Relying Party iframe
A Relying Party iframe will need to be created to communicate with the OP iframe. Refer to our example implementation with some comments to help with the implementation.
Putting the two iframes together
Once the RP iframe has been implemented, it is as simple as including both on a page that is authenticated.
Sample HTML for including both:
<iframe id="rpif" style="width:0;height:0;border: 0;border: none;position:absolute;" src="https://RPserver.example.com/rpiframe"></iframe> <iframe id="opif" style="width:0;height:0;border: 0;border: none;position:absolute;" src="https://oneginiOPServer.example.com/oauth/v1/checksession'}"></iframe>
The Onegini Token Server requires Onegini CIM or any other SAML identity provider to determine if the user is still authenticated. For a
can also use the SAML redirect or post binding.
When a different type of identity provider is used, the Onegini Token Server will always respond with the error
Hosts and cookies
The request towards the Onegini Token Server requires a cookie to determine the session. Browsers are no longer always sending cookies to servers to protect the privacy of their users. The request to check the session with the OP is done via an iframe, and this has brought restrictions to the setup. Some browsers will only send cookies to the OP when it shares the domain name with the RP and only via https.
When the RP is accessed on
https://www.example.com, the OP must use a host name that ends with
example.com. Browsers will send the cookies to
https://oneginiOPServer.example.com, but not to
If you are experiencing errors in the browser about the RP iframe when testing, you may need to tweak the
X-Frame-Options header in your application to allow
same-origin when serving an
iframe from your own domain.
If your RP sends a Content-Security-Policy response header, it must allow iframes on its own host the host of the OP.