Forum Discussion
Rabbit23_116296
Feb 04, 2014Nimbostratus
Hi Micah
I have tested the above and I wanted to know what do you managed to achieve with the above? We have a service provider that has a short cookie and or saml session validity that constantly redirects users back to our idp. We want to work around this.
Does this provide a cookie authentication mechanism to the idp which does not require the user to re-enter credentials?
- Micah_HaarbrinkFeb 05, 2014NimbostratusThis applies an expiration to the cookies that the F5 establishes. The number after MRHSession and LastMRH_Session is the number of seconds the cookie is good for. Without this iRule, the cookies were just left as a session cookie and would disappear when we closed the browser or restarted the system. Now the cookie stays valid on the system for that long. If the SP sends back an authentication request, the user hits the F5 logon page, the cookie is checked and if it's still good just sends the user back to the SP.