Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Front Door Authorization

Front Door Authorization

As part of Penn’s Identity & Access Management (IAM) Program, Front Door Authorization for PennKey-protected applications was implemented in fall 2024 after a successful pilot.

What Is "Front Door Authorization"?

WebLogin generally provides user authentication but defers authorization to the protected PennKey application. “Front door” authorization is an expansion of WebLogin functionality that authorizes users when they log in and before redirecting to an application, which provides an added layer of security. Application owners will use a management UI to apply authorization policies to their PennKey-protected applications, selecting from a menu of pre-defined populations to restrict access for their applications.

Who Can Benefit from This Service?

Owners of PennKey WebLogin-protected applications should use front door authorization for their services.

Benefits

Benefits include:

  • Provides an extra security control on top of service-specific authorization
  • Provides defense in depth by authorizing users when they log in and before redirecting to an application; invalid users are stopped immediately
  • Allows delegated admin to easily enable/disable/configure the front door
  • Provides descriptive and customizable error pages that help users diagnose the problem
  • Prevents users who leave Penn from accessing protected services

Info & Contact

  • To request Front Door Authorization, submit a request via the Support Center.
  • For detailed information, see the Front Door Authorization documentation website.
  • Front Door Authorization is provided by ISC’s Access Management Services.

    Visit ISC on LinkedIn

    Print
    IAM Home
    IAM Projects
    • Front Door Authorization
    • Duo Universal Prompt
    • PennKey Login UI Refresh
    • PennKey Support Application
    • Enhanced Client or Proxy (ECP)
    • PennKey Self-Service Password Reset (SSPR)
    • Penn Community Re-Engineering
    • PennPath (Consumer IAM)
    Related Initiatives
    • Two-Step Verification
    • Active Directory & IAM
    Updates
    • Current Update
    • Archive
    Resources
    • IAM Program at a Glance
    • General IAM Resources
    • Penn IAM Resources
    • Penn Community Website
    • Computing Policies
    • Tech Jobs @ Penn

    © 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff