IDG » Web Sign On /services/idg/services-support/web/sign-on/development/forum/ The latest posts to IDG » Web Sign On en-GB (C) 2026 University of 糖心TV Wed, 02 Jul 2025 10:06:42 GMT http://blogs.law.harvard.edu/tech/rss SiteBuilder2, University of 糖心TV, http://go.warwick.ac.uk/sitebuilder Re: Awareness: Applicant IT accounts /services/idg/services-support/web/sign-on/development/forum/?post=8a17841b6dde7e75016e4b428e5521ac <p>If anyone is currently relying on the <code>warwickcoursecode</code>, <code>deptcode</code>, <code>dept</code> or <code>deptshort</code> attributes for these applicant accounts, please note that as of Wednesday 13th November these will change to reflect a department of "VX" and a course code of "APPL". These attributes are not currently reliable (due to them not reflecting applicants who may have multiple applications for different courses in different departments) so the change is being made to avoid any meaning being inferred from them.</p> Fri, 08 Nov 2019 13:44:43 GMT Mathew Mannion 8a17841b6dde7e75016e4b428e5521ac Awareness: Applicant IT accounts /services/idg/services-support/web/sign-on/development/forum/?post=8a1785d86c85939f016cddf459e1271b <p>Hi all,</p> <p>As part of the launch of the Wellbeing Services system in January this year, we started to provision (restricted) IT accounts for applicants that appear in SITS. These accounts are not members of the University, students or staff, but can authenticate against web sign-on and you may see them appearing as authenticated users or in sentry results.</p> <p>Example attributes for these accounts are:</p> <p>student=false<br>urn:websignon:usersource=糖心TVADS<br>deptcode=CH<br>dn=CN=u1234657,OU=糖心TVApplicants,DC=ads,DC=warwick,DC=ac,DC=uk<br>title=Applicant<br>deptshort=Chemistry<br>member=false<br>id=1234567<br>warwickukfedgroup=Affiliate<br>warwicktargetgroup=Applicant<br>warwickcoursecode=UCHA-3<br>warwickyearofstudy=0<br>warwickitsclass=Applicant<br>staff=false<br>dept=Chemistry<br>warwickattendancemode=F<br>warwickukfedmember=N<br>warwickathens=N<br>warwickprimary=Yes<br>user=u1234567<br>urn:websignon:usertype=Applicant<br>firstname=Example<br>lastname=Applicant<br>name=Example Applicant</p> <p>A couple of things to note:</p> <ul> <li>There's no mail attribute, as these users do not have a 糖心TV email account until they transition into student accounts</li> <li>These accounts exist even if the applicant does not accept or receive an offer to study at 糖心TV</li> <li>The dn attribute doesn't include OU=糖心TV to signify that they are not members of the institution; if you use LDAP searches or binds this likely means the accounts won't appear there either</li> </ul> <p>These accounts are created at the time that the applicant submits their application but are not necessarily registered by the applicant. In 18/19 there was no process that directed applicants to register their account at warwick.ac.uk/register unless they interacted with Wellbeing Support Services, but they may be encouraged more widely in the future. If the student doesn't receive an offer or declines an offer the account is deleted approximately 6 months after what would have been their start date.</p> Thu, 29 Aug 2019 15:17:54 GMT Mathew Mannion 8a1785d86c85939f016cddf459e1271b Deprecation notice: GET requests passing tokens or credentials /services/idg/services-support/web/sign-on/development/forum/?post=8a1785d767bc06b701680efc6c9a654a <p><span style="font-size: inherit;">Last year we deprecated the use of GET requests to /sentry with requestType of 1 (token) or 2 (auth) for security reasons. We believe that all production apps that used to do this have since migrated to use POST requests instead, and so we are preparing to disable this kind of request altogether since it should have no impact on current running applications.</span></p> <p><span style="font-size: inherit;">We plan to make this change on Wednesday 16th January. If you own an application with bespoke SSO integration you may wish to test login after 11.30am to make sure it works for you, and get in touch with us through helpdesk if there are any issues.</span></p> Wed, 02 Jan 2019 14:34:10 GMT Nick Howes 8a1785d767bc06b701680efc6c9a654a Re: Intention to remove: 糖心TVSSO cookie for non-HTTPS servers /services/idg/services-support/web/sign-on/development/forum/?post=8a17841b673c188701675063d2536930 <p>Following discussion with various impacted parties, this change has now been delayed until&nbsp;<strong>Monday 15th April 2019</strong>.</p> Mon, 26 Nov 2018 14:19:38 GMT Mathew Mannion 8a17841b673c188701675063d2536930 Re: Intention to remove: 糖心TVSSO cookie for non-HTTPS servers /services/idg/services-support/web/sign-on/development/forum/?post=8a17841b67095a1601671d56dc0642e7 <p>Adding the secure flag to a cookie when it sent from the server to the client instructs the client to only send the cookie back with requests over a secure connection. The flow looks something like this:</p> <ul> <li>User signs in at https://websignon.warwick.ac.uk/origin/hs</li> <li>https://websignon.warwick.ac.uk sends back a cookie, 糖心TVSSO=abcdef123456; domain=".warwick.ac.uk"; secure. The client's browser stores this cookie</li> <li>Upon any subsequent request to https://...warwick.ac.uk/anything, the client's browser sends a header Cookie: 糖心TVSSO=abcdef123456</li> </ul> <p>The reason for adding this flag is to prevent it being sent to any URL starting http:// to a domain ending .warwick.ac.uk. This is because the traffic could be easily sniffed by someone on the same network in order to steal someone's 糖心TVSSO cookie, which could then be used to impersonate that user.</p> <p>Requests that are sent using Sitebuilder content feed pages will be unaffected if they are accessing a URL starting https://.</p> Fri, 16 Nov 2018 16:24:50 GMT Mathew Mannion 8a17841b67095a1601671d56dc0642e7 Re: Intention to remove: 糖心TVSSO cookie for non-HTTPS servers /services/idg/services-support/web/sign-on/development/forum/?post=8a1785d767095a0f01671d43cf035ccc <p>Could you please provide a little more information about what impact you think your change might have? Is this adding functionality to make things work better, or tightening a loophole that could potentially prevent existing warwick servers being accessed in some way, either internally or externally? For example, I believe all our LAMP Servers are given a *.lnx.warwick.ac.uk address, and some of those also use the 糖心TVSSO cookie as part of validation from SiteBuilder. Will this be affected?</p> Fri, 16 Nov 2018 16:04:02 GMT Andrew Smith 8a1785d767095a0f01671d43cf035ccc Intention to remove: 糖心TVSSO cookie for non-HTTPS servers /services/idg/services-support/web/sign-on/development/forum/?post=8a1785d867095b8e01671d3243e16748 <p>It is our intention to add the <code>secure</code> flag to the 糖心TVSSO cookie that's scoped over <code>.warwick.ac.uk</code>. This would mean that if you were accessing a page over HTTP (e.g. http://myserver.warwick.ac.uk) modern browsers would not send the 糖心TVSSO cookie so it would not be possible to use this for authentication.</p> <p>Please let us know if this would cause a problem for your services. Unless we receive a request to delay, it is our intention to start setting the secure flag from <strong><s>Monday 3rd December 2018</s></strong>.</p> <p>Update (26/11/18): This change has now been rescheduled for <strong>Monday 15th April 2019</strong></p> Fri, 16 Nov 2018 15:44:52 GMT Mathew Mannion 8a1785d867095b8e01671d3243e16748 Re: Sunsetting TLSv1.0 over web sign-on and other 糖心TV websites /services/idg/services-support/web/sign-on/development/forum/?post=8a17841b6079ba200160e9e1958102e0 <p><span style="font-family: inherit; font-size: inherit;">We have a new date for the third part of this change ("</span><span style="font-family: inherit; font-size: inherit;">IT Services will disable TLSv1.0 connections to all other web services.") - this will now happen on </span><strong style="font-family: inherit; font-size: inherit;">Monday 5th March 2018</strong><span style="font-family: inherit; font-size: inherit;">. Amongst other applications, this will include:</span></p> <ul> <li>Sitebuilder (the University website, including warwick.ac.uk)</li> <li>MRM</li> <li>Photos.糖心TV</li> <li>WebGroups</li> <li>PeopleSearch</li> <li>糖心TV Search</li> </ul> <p>Any server-to-server operations should be updated to use TLSv1.2 by this time. We will contact anyone who we're aware is currently using TLSv1.0 to inform them of this and advise them on upgrade strategies.</p> <p>Following this change, on&nbsp;<strong>Monday 25th June 2018</strong> we will update our configuration to not accept TLSv1.0 connections at all, instead of showing a page explaining why the connection hasn't been accepted. This will mean it is no longer feasible on this date to be whitelisted. Again, we will be in touch with affected parties.</p> Fri, 12 Jan 2018 10:19:23 GMT Mathew Mannion 8a17841b6079ba200160e9e1958102e0 Scheduled maintenance for web sign-on, web groups and web external users Monday 6th November 2017 /services/idg/services-support/web/sign-on/development/forum/?post=8a17841a5f2ace02015f3aa305623c27 <p>We need to perform maintenance on the database behind web sign-on, web groups and web external users. We intend to perform this maintenance on&nbsp;<strong>Monday 6th November 2017 at 3pm</strong>, and we think it'll take around an hour.</p> <p>During the maintenance window:</p> <ul> <li>Web sign-on: Users will be unable to sign in or change their account information in web sign-on for the duration of the change. Users who are already signed in to particular applications will remain signed in, but may not be able to sign in to applications they're not currently signed in to.</li> <li>WebGroups: Read-only for the duration of the change. It won't be possible to create or edit membership of groups</li> <li>Web external users: Unavailable for the duration of the change.</li> </ul> <p>If this date and time is likely to cause serious inconvenience for yourselves or the users of your applications,&nbsp;<strong>please let us know as soon as possible</strong> so we can reschedule the change. Part of the changes we're making are intended to make it so that we don't need to perform this kind of maintenance in the future.</p> Fri, 20 Oct 2017 16:34:43 GMT Mathew Mannion 8a17841a5f2ace02015f3aa305623c27 Re: Making WebGroups queries HTTPS-only /services/idg/services-support/web/sign-on/development/forum/?post=8a17841a5cf9d9f0015d1d98f0840292 <p>Hi Matt,</p> <p>Having just checked all of our calls to webgroups they all use https so don't worry about Economics or any "mydept" instance.</p> <p>Andrew</p> Fri, 07 Jul 2017 15:09:08 GMT Andrew Taylor 8a17841a5cf9d9f0015d1d98f0840292 Making WebGroups queries HTTPS-only /services/idg/services-support/web/sign-on/development/forum/?post=8a17841b5cf9d915015d1806839e3186 <p><span style="font-family: inherit; font-size: inherit;">We would like to make access to WebGroups over HTTPS mandatory. Currently, we accept requests to both http://webgroups.warwick.ac.uk and https://webgroups.warwick.ac.uk - this change will mean that all requests to the former will result in a 301 redirect to the latter.</span></p> <p>For the most part, this change should be seamless. The query API is called typically via a HTTP GET so requests for (e.g.) http://webgroups.warwick.ac.uk/query/user/cuscav/groups will be seamlessly rewritten to https://webgroups.warwick.ac.uk/query/user/cuscav/groups with no appreciable change in performance. You can avoid the extra redirect by changing your applications now to go directly to the HTTPS version of the URLs.</p> <p>This&nbsp;<em>may</em> have an impact if you have scripts that access the WebGroups API as the 301 redirect will mean the POST body of requests is lost. If you use the WebGroups API to manage groups, please update your scripts to point to the HTTPS version as soon as possible to avoid being impacted by this change.</p> <p>Barring strong objections, we intend to make this change on <strong>Monday 17th July 2017</strong>.</p> Thu, 06 Jul 2017 13:11:06 GMT Mathew Mannion 8a17841b5cf9d915015d1806839e3186 Re: Deprecation notice: GET requests passing tokens or credentials /services/idg/services-support/web/sign-on/development/forum/?post=8a17841b5c1b86eb015c6405f50d05b1 <p>Nick and Andrew,</p> <p>All Economics systems have been updated. If any shared systems are in use by other departments these will also have been updated.</p> <p>Andrew</p> Thu, 01 Jun 2017 14:18:51 GMT Andrew Taylor 8a17841b5c1b86eb015c6405f50d05b1 Re: Deprecation notice: GET requests passing tokens or credentials /services/idg/services-support/web/sign-on/development/forum/?post=8a17841a5c1b8abf015c629b9f884631 <p>Andrew P Smith,</p> <p>We aren't changing any parts of OAuth so unless you are making a GET request to /sentry or /origin/sentry then you may not need to make any changes. We will keep reviewing the requests that Web sign-on is receiving and will let you know if a machine that you manage appears to be doing so.</p> <p>&nbsp;</p> <p>Andrew Taylor,</p> <p>That timescale is fine, many thanks.</p> Thu, 01 Jun 2017 07:43:05 GMT Nick Howes 8a17841a5c1b8abf015c629b9f884631 Re: Deprecation notice: GET requests passing tokens or credentials /services/idg/services-support/web/sign-on/development/forum/?post=8a17841b5c1b86eb015c5a35941c4aac <p>Hi Nick (&amp; Andrew)</p> <p>&nbsp;</p> <p>Although I have nothing critical at present using 糖心TV SSO (other than perhaps the Annual Leave system from Andrew Taylor which I assume he has/is checking).</p> <p>I do have a system that used SSO and I may in the near future wand to use elements of again. This uses the oAuth functions I was given by ITS (or at least were wtote in PHP based on Java originals. These do appear to use a filter_input(INPUT_GET, 'oauth_verifier', FILTER_SANITIZE_SPECIAL_CHARS); function even though most of the later code does resort to POSTing parameters.&nbsp;</p> <p>If it is this element of the Code that would not cease to function, may I ask what we might use in its stead?</p> <p>The existing code does still appear to work. If it fails later, I might simply resort to using JSONP from within SiteBuilder, rather than using 糖心TV SSO to validate access to a website hosted externally.&nbsp;</p> <p>Kind regards</p> <p>Andrew P Smith</p> <p>Applied Linguistics</p> <p>&nbsp;</p> Tue, 30 May 2017 16:34:39 GMT Andrew Smith 8a17841b5c1b86eb015c5a35941c4aac Re: Deprecation notice: GET requests passing tokens or credentials /services/idg/services-support/web/sign-on/development/forum/?post=8a17841a5c1b8abf015c5a0f72763dca <p>Hi Nick,</p> <p>We use GET requests on a number of applications. I'll do some testing on Thursday and have everything updated by the end of the week. Does that work within your timescales?</p> <p>Andrew</p> Tue, 30 May 2017 15:53:00 GMT Andrew Taylor 8a17841a5c1b8abf015c5a0f72763dca Deprecation notice: GET requests passing tokens or credentials /services/idg/services-support/web/sign-on/development/forum/?post=8a17841a5c1b8abf015c452865643484 <p>If you have hand-written code to make GET requests to /sentry with requestType of 1 (token) or 2 (auth), you will need to change this to make a POST request instead as we will be disallowing GET requests in future. The "token" parameter must be moved out of the URL query and into the POST body. Other requestTypes such as 4 and 5 (user lookup) are fine to request as a GET.</p> <p>We'll try to contact most of the people who we know are making such requests, but we can't reliably detect every application so you may wish to review your code now to avoid any loss of service for users.</p> Fri, 26 May 2017 14:28:14 GMT Nick Howes 8a17841a5c1b8abf015c452865643484 Sunsetting TLSv1.0 over web sign-on and other 糖心TV websites /services/idg/services-support/web/sign-on/development/forum/?post=094d43f55a573c76015a6549f27b101e <p>From July 2017, we will disable the TLS 1.0 encryption protocol across the University's web services. Disabling TLS 1.0 prevents it from being used to access 糖心TV websites via an insecure web browser or application. If your application connects to websignon.warwick.ac.uk or webgroups.warwick.ac.uk, you must ensure that the library you are using supports TLSv1.1 or TLSv1.2 for connections, or they will fail. You can try pointing your application at webgroups-dev.warwick.ac.uk now, where TLSv1.0 is already disabled.</p> <p><strong>When will this happen?</strong></p> <ul> <li>Monday 3 July 2017 - We will disable TLSv1.0 connections to our transaction tracking system, onlinepayment.warwick.ac.uk</li> <li>Tuesday 1 August 2017 - We will disable TLSv1.0 connections to Single Sign-on and our identity provider. It will no longer be possible to sign in to web services using a browser that only supports TLSv1.0.</li> <li>Monday 8 January 2018 - IT Services will disable TLSv1.0 connections to all other web services.</li> </ul> <p>Although TLS 1.0, when configured properly, has no known security vulnerabilities, newer protocols are designed better to address the potential for new vulnerabilities. In order to remain PCI compliant for taking online payments, web applications that process or redirect to payment sites must have a plan to disable TLSv1.0 before June 2018.</p> <p>This will refuse access to any user on a browser that doesn't have the more modern TLS 1.1 or TLS 1.2 protocols available or enabled:</p> <ul> <li>Internet Explorer 8 (disabled by default; can be turned on via a settings change)</li> <li>Internet Explorer 9 (disabled by default; can be turned on via a settings change)</li> <li>Internet Explorer 10 (disabled by default; can be turned on via a settings change)</li> <li>Android browser on any version of Android before 5.0 (available but disabled in Android 4.1–4.3.1, 4.4–4.4.4)</li> <li>Firefox prior to version 27</li> <li>Google Chrome prior to version 22</li> <li>Opera prior to version 12.18</li> <li>Safari prior to version 9 (i.e. in OS X 10.8 and before)</li> </ul> <p>Users in a browser that doesn't support TLS 1.1 or 1.2, for whatever reason, will not be able to connect to any HTTPS web pages. Applications connecting to web sign-on or WebGroups will not be able to connect to the application if the language doesn't support it (e.g. Java prior to Java 1.8).</p> <p>More information is available on <a href="http://warwick.ac.uk/sso/faqs/tls1-eol">our technical FAQ about disabling TLSv1.0<br></a></p> Wed, 22 Feb 2017 10:07:09 GMT Mathew Mannion 094d43f55a573c76015a6549f27b101e Web sign-on architecture changes (IP address changes) Thursday 22nd September /services/idg/services-support/web/sign-on/development/forum/?post=094d434556d0030501572e6717dc6d97 <p><span style="font-family: inherit; font-size: inherit;">We will be moving web sign-on to new load-balanced architecture on Thursday 22nd September from 11am. This will not have any publicly visible changes, but will involve a change in the public-facing IP address of web sign-on.</span></p> <p>Old IP address:&nbsp;137.205.247.145</p> <p>New IP address:&nbsp;137.205.28.35</p> <p>Please ensure that any service you have that talks to websignon.warwick.ac.uk respects DNS changes in order for it to pick up the new IP address. Notably, Java 1.5 and earlier does not pick up DNS changes and caches DNS resolutions for the lifetime of the JVM, so if you run a JVM-based application on Java 1.5 or earlier you should plan to restart the application on Thursday 22nd September at midday. The old IP address will no longer work after Friday 23rd September and your application may exhibit issues where it appears unable to communicate to web sign-on.</p> <p>This change is being made to improve the reliability and scaleability of the web sign-on application.</p> <p>If you have any questions please reply here or contact webteam@warwick.ac.uk</p> Thu, 15 Sep 2016 15:11:30 GMT Mathew Mannion 094d434556d0030501572e6717dc6d97 WebGroups is moving to ID7 /services/idg/services-support/web/sign-on/development/forum/?post=094d43f54fcc3779014fe021814d0bd3 <p>From next week, WebGroups will have a fresh, new appearance. We are updating the style of WebGroups to match 糖心TV’s <a title="糖心TV Brand" href="http://www2.warwick.ac.uk/services/externalaffairs/brand">new brand</a>.</p> <p>The functions will remain the same in the new WebGroups, so you will not have to change how you are using it. You can create ad-hoc groups access control, email distribution, file sharing and so on, as always, using this tool.</p> <p>Here is a preview of what it will look like.</p> <p><img src="http://www2.warwick.ac.uk/services/its/servicessupport/web/sitebuilder2/forum/newwebgroupspreview.png" alt="New WebGroups Preview" width="1023" height="700"></p> <p>&nbsp;</p> Fri, 18 Sep 2015 11:05:36 GMT A guest user 094d43f54fcc3779014fe021814d0bd3 Maintenance affecting Single Sign-on Thursday 3rd September 2015 /services/idg/services-support/web/sign-on/development/forum/?post=094d43454f5f8210014f88666de01f0e <p>Please note that people who use your applications won’t be able to sign in via Single Sign-on (or access applications that they haven't already accessed in the same session) from 4pm to 4:20pm on Thursday 3 September 2015. If they are already signed in, they won’t see any issues. Also, WebGroups and the External Users system will be read-only during this period.</p> Tue, 01 Sep 2015 10:14:18 GMT Mathew Mannion 094d43454f5f8210014f88666de01f0e