Authentication timeout settings
Timeouts associated with SAML authentication are critical to both security and end user experience. For more information on the relationship of SAML timeouts with Domino, see this article.
SAML Single server session expiration
Under the Domino Web Engine tab in the Internet Site document, there is a SAML single server session expiration field. This field is specified in minutes, and indicates how long a SAML session is valid. When the SAML session expires, a connecting client is redirected to the customer’s identity provider login form to begin the SAML authentication again. Completing the login requires user input before the client can resume activity with the Traveler service. The SAML session timeout should be set as long as possible for a more seamless experience with the client. For more information on the SAML Single server session setting, see Enabling SAML authentication in Domino.
Multi-server Session Authentication expiration (SSO)
SAML support for HCL Verse mobile clients when working with a Traveler High Availability pool requires that the Traveler endpoint is enabled for Multiple Server Session Authentication using the Web SSO configuration document. When a SAML authentication is completed, a secure token is set as a cookie on the response to the client that is valid on any participating Traveler Server. The Web SSO Configuration document has a setting for the expiration of this security token. When the token expires, a connecting client is redirected to the customer’s identity provider login form. Completing the login requires user input before the client can resume activity with the Traveler service.
Identity Provider SAML token expiration
The Identity provider may enforce its own SAML token expiration. Typically if a browser is redirected to the identity provider and the SAML token is still valid, the user is re-authenticated without having to supply their credentials. However, HCL Verse mobile clients do not retain any cookies exchanged with the identity provider during the SAML authentication. The effect is that no matter what the identity provider SAML token expiration is set to, the HCL Verse mobile clients require the user to re-supply their credentials.