Isim Security PDF 70
Isim Security PDF 70
Isim Security PDF 70
Version 7.0.1.7
Security Topics
IBM
IBM Security Identity Manager
Version 7.0.1.7
Security Topics
IBM
ii IBM Security Identity Manager Version 7.0.1.7: Security Topics
Table of contents
Table list . . . . . . . . . . . . . . v Changing the logoff page . . . . . . . . . 31
Creating a user in IBM Security Access Manager
Chapter 1. Application server security that WebSEAL uses to connect to the backend
server . . . . . . . . . . . . . . . 32
and IBM Security Identity Manager . . . 1 Defining IBM Security Access Manager Accounts 33
Defining IBM Security Access Manager groups 34
Chapter 2. External user registry for Adding IBM Security Access Manager user
authentication . . . . . . . . . . . . 3 account to a group . . . . . . . . . . . 35
Defining a junction that points to IBM Security
Chapter 3. Secure environment practices 5 Identity Manager Server . . . . . . . . . 35
Defining IBM Security Access Manager ACLs . . 37
Granting access to the IBM Security Access
Chapter 4. Secure sockets layer Manager ACLs . . . . . . . . . . . . 37
communication . . . . . . . . . . . 7 Associating the WebSEAL junction to the ACLs 39
SSL terminology . . . . . . . . . . . . . 7 Configuring IBM Security Identity Manager to
One-way and two-way SSL authentication . . . . 8 use single sign-on . . . . . . . . . . . 40
SSL in a clustered environment . . . . . . . . 9 Configuring WebSEAL. . . . . . . . . . 40
SSL implementations . . . . . . . . . . . 9 IBM Security Identity Manager web services in a
single sign-on environment . . . . . . . . . 41
Chapter 5. Certificate file types . . . . 11 Installing on a system where the IBM Security
Identity Manager is installed . . . . . . . 42
Chapter 6. Securing of communication Installing on a separate system than where the
IBM Security Identity Manager is installed . . . 44
with adapters . . . . . . . . . . . . 13
Starting the SSO application . . . . . . . . 46
Testing the SSO application . . . . . . . . 47
Chapter 7. Securing of communication Building the SSO application . . . . . . . 47
with custom applications . . . . . . . 15 Preparing the WebSphere Application Server . . 49
Accessing IBM Security Identity Manager consoles 50
Chapter 8. Secure communication with Frequently used commands to configure single
supported middleware . . . . . . . . 17 sign-on . . . . . . . . . . . . . . . . 51
Example SSL configurations . . . . . . . . . 17
Preparation for SSL configuration . . . . . . . 18 Chapter 10. Security layer
Creating a certificate . . . . . . . . . . . 18 configuration around the data model
Configuring SSL for the database server . . . . . 20 and reports . . . . . . . . . . . . . 55
Configuring SSL for the directory server . . . . . 20 Authentication and authorization for IBM Cognos
Configuring SSL on the application server . . . . 21 reports . . . . . . . . . . . . . . . . 55
Configuring the IBM Security Identity Manager User authentication setup by using LDAP . . . . 55
Server . . . . . . . . . . . . . . . . 22 Configuring an LDAP Namespace for IBM
Testing SSL communication between servers . . . 23 Directory Server . . . . . . . . . . . . 55
Configuration of the HTTP server for additional Creating users in an LDAP . . . . . . . . . 57
security and performance. . . . . . . . . . 24 Access control definition for the reports and
SSL for the IBM HTTP server and Application reporting packages . . . . . . . . . . . . 58
server plug-in . . . . . . . . . . . . . 25 Restricting administration access and adding an
Configuring SSL for the IBM HTTP server . . . 25 LDAP user to system administrator role . . . . 58
Configuring SSL for the plug-in . . . . . . 26 Creating a role and adding LDAP users as
members . . . . . . . . . . . . . . 59
Chapter 9. Configuration of single Defining an access to the report by using a role 60
sign-on . . . . . . . . . . . . . . 29 Defining an access to the reporting package by
Configuration of IBM Security Identity Manager for using a role . . . . . . . . . . . . . 60
single sign-on with Application server Trust References for IBM Cognos report security
Association Interceptor and IBM Security Access configuration . . . . . . . . . . . . . . 61
Manager WebSEAL . . . . . . . . . . . . 29
Account mapping . . . . . . . . . . . 30 Index . . . . . . . . . . . . . . . 63
iii
iv IBM Security Identity Manager Version 7.0.1.7: Security Topics
Table list
1. Practices for a secure IBM Security Identity 3. Files in the /certs directory . . . . . . . 19
Manager environment . . . . . . . . . 5 4. Logoff pages . . . . . . . . . . . . 31
2. Example SSL configurations . . . . . . . 18 5. LDAP advanced mapping values . . . . . 56
v
vi IBM Security Identity Manager Version 7.0.1.7: Security Topics
Chapter 1. Application server security and IBM Security
Identity Manager
IBM® Security Identity Manager uses Application server security.
When you install IBM Security Identity Manager, you select either the default
custom registry that is provided with IBM Security Identity Manager, or you select
an external user registry. If you choose the default custom registry, the installation
program automatically creates a security domain that has application security
enabled. If you select an external user registry, you must manually enable
application security for the security domain that IBM Security Identity Manager
uses.
The external user registry can operate at the global security level, or can be part of
a specific security domain. If you select an external user registry that is used for
global security, then you must enable application security for global security. If you
select an external user registry that is associated with a security domain, then you
must enable application security for that security domain.
For information on using an external user registry, see Chapter 2, “External user
registry for authentication,” on page 3.
IBM Security Identity Manager provides a default custom registry. You do not have
to use this registry for authentication. You can choose to use an external registry.
An external user registry is any other registry that can be configured with
Application server. You can use an existing registry or configure a new one.
For more information, see Configuring the Identity external user registry.
v If you use the custom registry, the IBM Security Identity Manager installation
program programmatically creates a security domain, enables application
security, and configures it to the IBM Security Identity Manager custom registry.
v If you use an external registry, you must manually configure application security.
To use an external user registry, you must complete specific configuration tasks.
The IBM Security Identity Manager product distribution includes three documents
that describe an example deployment with an external user registry. The following
documents are included in the directory /extensions/7.0/doc/authentication/:
5
Table 1. Practices for a secure IBM Security Identity Manager environment (continued)
Given sensitive data in these areas Ensure that these practices occur
Network traffic Restrict network traffic to what is required
by the deployment. If you write your own
application and use an IBM Security Identity
Manager API to retrieve sensitive data,
encrypt the data before you send it over the
network.
WebSphere® Application Server security Enable security on WebSphere Application
Server and disallow running WebSphere
Application Server with a non-root account.
SSL provides encryption of the data that is exchanged between the applications. An
application that acts as an SSL server presents its credentials in a signed digital
certificate to verify to an SSL client that it is the entity it claims to be. You can also
configure an application that acts as an SSL server to require the application that
acts as an SSL client to present its credentials in a certificate. This method
completes a two-way exchange of certificates.
SSL terminology
These terms apply to Secure Sockets Layer communication for IBM Security
Identity Manager.
SSL server
Listens for connection requests from SSL clients. For example, theIBM
Security Directory Server might be an SSL server that listens for connection
requests from the IBM Security Identity Manager Server and the
WebSphere Application Server.
SSL client
Issues connection requests. For example, the computer on which the IBM
Security Identity Manager Server and the WebSphere Application Server
are installed is the SSL client, which issues connection requests to the IBM
Security Directory Integrator.
Signed certificates
Is an industry-standard method of verifying the authenticity of an entity,
such as a server, client, or application. Signed certificates are issued by a
third-party certificate authority for a fee. Some utilities, such as the
iKeyman utility, can also issue signed certificates. A certificate authority or
CA certificate must be used to verify the origin of a signed digital
certificate.
Signer certificates (certificate authority certificates)
Must be used to verify the origin of a signed digital certificate. When an
application receives a signed certificate from another application, it uses a
CA certificate to verify the originator of the certificate. Many applications,
such as web browsers, are configured with the CA certificates of
well-known certificate authorities. This practice eliminates or reduces the
task of distributing CA certificates throughout the security zones in a
network.
Self-signed certificates
Contains information about the owner of the certificate and the owner of
the signature. Basically, it is a signed certificate and CA certificate in one. If
you choose to use self-signed certificates, you must extract the CA
certificate from it in order to configure SSL.
SSL keystore
Is a key database file designated as a keystore. It contains the SSL
certificate.
7
Note: The keystore and truststore can be the same physical file.
SSL truststore
Is a key database file designated as a truststore. The SSL truststore contains
the list of signer certificates (CA certificates) that define which certificates
the SSL protocol trusts. Only a certificate issued by one of these listed
trusted signers is accepted.
Note: The truststore and keystore can be the same physical file.
One-way SSL authentication
Requires a keystore and certificate only on the SSL server side (such as the
Security Directory Server) and a truststore only on the SSL client side (such
as the Security Identity Manager Server).
Two-way SSL authentication (client-side authentication)
Requires a keystore with a certificate and a truststore that contains the
signer of the certificate that issued the other certificate on both the SSL
server and client.
Truststore Keystore
Two-way authentication creates a truststore and a keystore on both the client and
the server. In this example, there is a CA certificate "A" in the truststore and a CA
certificate "B" in the keystore on both client and server.
Truststore Truststore
Keystore Keystore
For more information about configuring SSL communication between the IBM
Security Identity Manager Server and an IBM Security Identity Manager adapter,
see the installation and configuration guide for the adapter.
SSL implementations
IBM Security Identity Manager Server uses several implementations of the SSL
protocol.
IBM Security Identity Manager Server uses these implementations of the SSL
protocol:
IBM Global Security Toolkit (GSKit)
Used by the WebSphere Application Server, IBM Security Directory Server,
and IBM Security Identity Manager adapters.
IBM Java™ Secure Socket Extension (JSSE)
Used by the IBM Security Identity Manager Server and by IBM Security
Directory Integrator
Files that store certificates and keys can have the following formats:
.pem A privacy-enhanced mail file with a file extension of .pem. It begins and
ends with the following lines:
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
11
12 IBM Security Identity Manager Version 7.0.1.7: Security Topics
Chapter 6. Securing of communication with adapters
The IBM Security Identity Manager Server uses either SSL or Secure Shell (SSH)
communication to communicate securely with supported adapters.
Security A UNIX
IBM Security d SSH
Identity Directory a managed
Manager SSL Integrator p resource
Server t
e
r LDAP
SSL
managed
resource
S
S
L
Other
adapters
KEY:
SSL = One-way or two-way SSL
Managed resources can communicate with the IBM Security Identity Manager
adapters with the following protocols:
SSL Configures adapters, such as Windows Server Active Directory or Lotus
Notes®, to use SSL authentication to communicate with the IBM Security
Identity Manager Server. Not all adapters use the same SSL configuration.
For more information, see the installation and configuration guide for the
specific adapter.
Secure Shell (SSH)
Is used between the adapter and managed resource. The SSH protocol
requires no configuration. The use of SSH between the adapter and
managed resources cannot be disabled. However, configuration of SSH
might be required on the managed resource. For more information, see the
IBM Security Identity Manager adapter installation and configuration
guides for UNIX and Linux.
13
14 IBM Security Identity Manager Version 7.0.1.7: Security Topics
Chapter 7. Securing of communication with custom
applications
If you develop custom applications to access the IBM Security Identity Manager
Server, these applications must adhere to the programming guidelines described in
this section.
IBM Security Identity Manager shields its core functions with a layer of managed
enterprise Java beans (EJBs). These EJBs are in an unprivileged layer of the IBM
Security Identity Manager, which is illustrated in Figure 4.
When the IBM Security Identity Manager communicates with a client application,
every managed EJB method takes a signed token from the caller. The token verifies
the caller identity, except when the method does the authentication. The caller
obtains this signed token after authentication with the IBM Security Identity
Manager Server.
Web EJB
container Container
Browser
IBM
Web application Security
(JSPs/servlets) Identity
Manager
core logic
Privileged
IBM Security
Identity Manager EJBs
APIs
Managed
(unprivileged)
EJBs
Custom application
15
The following types of custom applications can be created to communicate with
the IBM Security Identity Manager Server:
Stand-alone Java client
Deployed as a WebSphere Application Server thin client.
Web application
Deployed outside of WebSphere Application Server. A web application can
start only a specific subset of IBM Security Identity Manager Server APIs.
Enterprise application, same Java virtual machine (JVM)
Deployed in the same server instance (enrole.ear) as the IBM Security
Identity Manager Server .
Enterprise application, separate JVM
Deployed on the same computer as the IBM Security Identity Manager
Server, but runs as a separate JVM process.
Servlets
Deployed on a separate computer that runs WebSphere Application Server.
Servlets are not deployed in the context of a web application.
When you develop custom applications to communicate with the IBM Security
Identity Manager Server, use the following rules to ensure secure communication:
v Allow only published APIs to access the managed EJBs in the unprivileged area.
v Allow custom applications to use only the functions that the APIs provide.
v Ensure that the computer on which the IBM Security Identity Manager Server
runs is always secure.
Appliance Cluster
Web server /
Managed resource Reverse proxy /
Load balancer
Directory server
Database server
Directory Integrator
Cognos server
server
After initial installation, you might configure secure communication links between
IBM Security Identity Manager Server and these applications:
v Database server
v Directory server
v HTTP server
v Web browser
v Other supported middleware
In Table 2 on page 18, the first application is the SSL client, and the second
application is the SSL server:
17
Table 2. Example SSL configurations
One-
way Two-
SSL client SSL server SSL way SSL
IBM Security Identity Manager LDAP directory server
Server
HTTP server (IBM HTTP IBM Security Identity Manager
Server) Server
Web browser IBM Security Identity Manager
Server
Your site might require additional configuration for SSL authentication with the
IBM Security Identity Manager Server.
Creating a certificate
Use the iKeyman utility to create a self-signed certificate and extract the certificate
to make it available for secure communication.
Procedure
1. Start the iKeyman utility. For example, type the gsk7ikm command in the
/usr/local/ibm/gsk7/bin directory
2. If the iKeyman utility cannot locate Java, run this command: export
JAVA_HOME=opt/IBM/ldapv6.1/java/jre
3. On the IBM Key Management page, select Key Database File > Open > New.
4. Select a default database type of CMS.
5. In the File Name field, type a name for the CMS key database file. For
example, type: LDAPSERVER_TEST1234.kbd
For example, the value specifies application_serverhostname where application is
the directory server, and serverhostname is the computer that has the directory
server.
6. In the Location field, specify a location to store the key database file. For
example, type /certs.
7. Click OK.
8. On the Password menu:
a. Type and then confirm a password, such as Pa$$word1.
b. Specify the highest password strength possible.
c. Specify Stash the password to a file?.
d. Click OK.
9. Select Create > New Self Signed Certificate and specify a label that matches
the CMS key database file name, such as LDAPSERVER_TEST1234.
This example uses the same name (LDAPSERVER_TEST1234) for both the
certificate name and the key database file that contains the certificate.
10. Type IBM in the Organization field, accept the remaining field default values,
and click OK. A self-signed certificate, including public and private keys, now
exists.
11. For subsequent use with clients, extract the contents of the certificate into an
ASCII Base-64 Encoded file. Complete these steps:
a. Select Extract Certificate.
b. Specify a data type of Binary DER Data.
A file with an extension of .der contains binary data. This format can be
used only for a single certificate. Specify this format to extract a self-signed
certificate.
c. Specify the name of the certificate file name you created, such as
LDAPSERVER_TEST1234.der.
d. Specify a location, such as /certs, in which you previously stored the key
database file
e. Click OK.
12. Verify that the /certs directory contains the following files:
Table 3. Files in the /certs directory
File Description
LDAPSERVER_TEST1234.crl Not used in this example.
LDAPSERVER_TEST1234.der The certificate.
Note: If you use an existing or newly acquired certificate from a CA, copy it
to the /certs directory on root file system of the directory server.
What to do next
For more information, see:
v Topics on securing directory communications in the IBM Security Directory Server
Administration Guide at
http://www.ibm.com/support/knowledgecenter/SSVJJU/welcome
v IBM Global Security Kit Secure Sockets Layer Introduction and iKeyman User’s Guide
at
http://www.ibm.com/support/knowledgecenter/SSPREK_6.1.1/
com.ibm.itame.doc_6.1.1/ss7cumst.htm?cp=SSPREK_6.1.1%2F0-3-5
To use SSL for secure communications, select the SSL check box in the Database
Server Configuration Details window from the Database Server Configuration page
of the Appliance Dashboard. For more information, see Managing the database
server configuration.
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Note: The empty lines that contain only the - (hyphen) character are required
for LDIF file formatting.
To change the secured port from the default port number 636, add these
additional lines:
replace: ibm-slapdSecurePort
ibm-slapdSecurePort: 637
3. Place the LDIF file in the following directory:
/opt/IBM/ldap/V6.1/bin
4. Run the idsldapmodify command, which modifies the password policy by
adding the LDIF file to the process.
idsldapmodify -D cn=root -w passwd -i ssl.ldif
-D Binds to the LDAP directory, which is cn=root in this example.
-w Uses the passwd value, which is the directory server administrator
password, as the password for authentication.
-i Reads the entry modification information from an LDIF file instead of
from standard input. In this example, the file is named ssl.ldif.
A successful result produces a message similar to the following one:
Operation 0 modifying entry cn=SSL,cn=Configuration
5. Test the directory server to confirm that it is listening on the default secure port
636. Follow these steps:
a. Stop the directory server. Type /opt/IBM/ldap/V6.1/sbin/ibmslapd -k:.
b. Start the directory server. Type /opt/IBM/ldap/V6.1/sbin/ibmslapd -I
itimldap.
Where -I specifies the instance.
c. Determine whether the directory server is listening on port 636. For
example, display statistics for the network interface with the directory
server by typing netstat -an |grep 636.
A return message that indicates the port is listening might be this example:
tcp 0 0 9.42.62.72:636 0.0.0.0:* LISTEN
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Procedure
1. Log on to the IBM Security Identity Manager virtual appliance console.
2. From the top-level menu of the Appliance Dashboard, click Configure >
Advanced Configuration > Application Server Certificate Management to
display the Application Server SSL Certificate page. The Application Server SSL
Certificate page displays the certificate details.
3. Click Update to open the Upload Keystore window.
4. Click Browse to search and select the certificate that you want to import. The
File field is populated with the certificate name. For example, appserver.jks.
5. Type the password for the certificate in the Keystore Password field.
6. From the Keystore Type list, select a type that specifies the keystore.
v CMSKS
v JCEKS
v JKS
v PKCS11
v PKCS12
7. Click Save Configuration.
Note: The application server SSL certificate configuration takes some time. Do
not refresh or close the page. Wait for the configuration process to complete.
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Procedure
1. On the computer that has the Security Identity Manager Server, edit the
java.naming.provider.url property that specifies the LDAP connection.
2. Log on to the IBM Security Identity Manager virtual appliance console.
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Procedure
1. Test that the Security Directory Server is listening. In the $TDS_INSTALL_HOME/
bin directory on the computer where Security Directory Server is installed, type
the following command on one line. For example:
ldapsearch -b dc=com –K /certs/LDAPSERVER_TEST1234.kdb
–p 636 -s base "objectclass=*"
By default, SSL is set to off in the IBM HTTP Server. To enable SSL, you must
specify SSL directives (properties) in the httpd.conf server configuration file. A
configuration that provides additional security and performance is similar to
Figure 7 on page 25
}
LDAP
data store
} Deployment Manager
JDBC driver
Appliance Cluster
Web server /
Managed resource Reverse proxy /
Load balancer
Directory server
Database server
Directory Integrator
Cognos server
server
SSL for the IBM HTTP server and Application server plug-in
The external IBM HTTP Server forwards HTTP requests that are sent to it to the
internal HTTP transport of the Application server web container through the
Application server plug-in.
To secure this communication, you must enable SSL for the IBM HTTP Server and
configure the Application server plug-in to communicate securely with the
Application server web container.
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
For enhanced security, do not use RC4 ciphers. Use the strongest cipher suites that
the browser and web server support. To set specific ciphers, see the "Setting
advanced SSL options" section at http://www.ibm.com/support/
knowledgecenter/SSAW57/mapfiles/product_welcome_wasnd.html.
To enable SSL on the IBM HTTP Server, use the configuration information to
complete these steps:
Procedure
1. Use the IBM HTTP Server iKeyman utility graphical user interface or command
line to create a CMS key database file and self-signed server certificate.
2. Enable SSL directives in the httpd.conf configuration file for the IBM HTTP
Server.
a. Uncomment the LoadModule ibm_ssl_module modules/mod_ibm_ssl.so
configuration directive.
b. Create an SSL virtual host stanza in the httpd.conf file by using the
following examples and directives:
LoadModule ibm_ssl_module modules/mod_ibm_ssl.so
<IfModule mod_ibm_ssl.c>
Listen 443
<VirtualHost *:443>
SSLEnable
</VirtualHost>
</IfModule>
SSLDisable
KeyFile "c:/Program Files/IBM HTTP Server/key.kdb"
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Set up the IBM HTTP server on a stand-alone computer that is external to any
other IBM Security Identity Manager component. For more information, see the
topic "Selecting a web server topology diagram and roadmap" on the following
website:
http://www.ibm.com/support/knowledgecenter/SSAW57_7.0.0/as_ditamaps/
welcome_nd.html
The application server profile to which you point during the WebSphere
Application Server plug-in installation and configuration is the deployment
manager itself in this topology. It creates a key file called plugin-key.kdb in the
app_server_root/profiles/dm_profile/etc directory. The plugin-key.kdb file
contains the certificates of all federated application servers.
Push the key file to the managed web server so the plug-in can establish secure
application with the application servers. For more information, see the topic
"Configuring the Web server plug-in for Secure Sockets Layer" on the web site:
http://www.ibm.com/support/knowledgecenter/SSAW57_7.0.0/as_ditamaps/
welcome_nd.html
Procedure
1. Create a directory on the web server host for storing the key ring file that is
referenced by the plug-in and associated files. For example, create a
plugin_install_root/etc/keys directory.
2. On the WebSphere Application Server administrative console, click Servers >
Web servers.
3. Select the web server name.
4. Click Plug-in properties.
5. Click Manage keys and certificates to access configuration options for your
keys and certificates. By default, you can change the password that protects the
keystore.
6. Click OK.
7. Click the web server keystores button to copy the keystore and to stash files to
a managed web server.
You can enable single sign-on for the IBM Security Identity Manager
administrative console, the Self-service console, and the Identity Service Center
applications with IBM Security Access Manager.
After you configure single sign-on, a user logs on to IBM Security Access Manager
web security one time. The identity of the user is propagated to IBM Security
Identity Manager, which eliminates the need for another login.
This function requires IBM Security Access Manager to enable single sign-on with
IBM Security Identity Manager.
1. IBM Security Access Manager provides user authentication and coarse-grained
authorization before it allows access to IBM Security Identity Manager.
2. IBM Security Identity Manager then applies fine-grained access control with its
own Access Control Item (ACI).
You can configure IBM Security Access Manager and IBM Security Identity
Manager for single sign-on with either
v WebSEAL
v IBM Security Access Manager plug-in servers
Before you configure single sign-on with WebSEAL, you must install and configure
IBM Security Access Manager and WebSEAL.
29
Account mapping
Single sign-on, account mapping occurs between IBM Security Access Manager and
IBM Security Identity Manager during login authentication.
When a user accesses IBM Security Identity Manager with WebSEAL and single
sign-on, the user must specify a IBM Security Access Manager user account and
password. IBM Security Access Manager checks if the user is authorized to access
IBM Security Identity Manager.
If the authentication and authorization are successful, the IBM Security Access
Manager user account is passed in the iv-user HTTP request header to IBM
Security Identity Manager. IBM Security Identity Manager passes the information
in the HTTP request header to IBM Security Identity Manager for further
processing. IBM Security Identity Manager uses the IBM Security Access Manager
user account to find a matching user account in the IBM Security Identity Manager
directory.
Typically, IBM Security Access Manager and IBM Security Identity Manager user
accounts are identical. If they are identical, the IBM Security Identity Manager user
can log in to IBM Security Identity Manager.
If they are not identical, you can configure IBM Security Identity Manager user
account mapping. There are two configuration options. They are controlled by the
enrole.authentication.idsEqual attribute in the
enRoleAuthentication.properties file.
Do these steps:
1. Log on to the IBM Security Identity Manager virtual appliance console.
2. From the top-level menu of the Appliance Dashboard, select Configure >
Advanced Configuration > Update Property to display the Update Property
page.
3. In the All properties tab of the Update Property page, click Identity server
property files.
4. Select enRoleAuthentication.properties.
5. Follow the steps that are described in Managing the server properties. View the
following information for the configuration options.
enrole.authentication.idsEqual=true
No mapping is attempted. The IBM Security Access Manager user account
passed in the iv-user HTTP request header must be identical to an IBM
Security Identity Manager user account defined in the IBM Security
Identity Manager directory for the user to log in to IBM Security Identity
Manager.
If the policy in your installation is that all IBM Security Identity Manager
user accounts must have matching IBM Security Access Manager user
accounts, specify enrole.authentication.idsEqual=true to avoid the
unnecessary mapping processing and overhead.
enrole.authentication.idsEqual=false
The IBM Security Access Manager user account passed in the iv-user
HTTP request header searched the IBM Security Access Manager directory
for a matching IBM Security Identity Manager user account:
v If an identical IBM Security Identity Manager is found, the user can log
in to IBM Security Identity Manager.
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Procedure
1. From the top-level menu of the Appliance Dashboard, click Configure >
Manage Server Setting > Single Sign-On Configuration.
2. From the Single Sign-On Configuration page, change the log off page. The
Logout page values are described in Table 4 on page 31.
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Use the pdadmin command to create a user in IBM Security Access Manager that
can be used by WebSEAL. For this task, the user name is sso. You can also use the
web interface to create the user.
Perform this task on the server where IBM Security Access Manager is installed.
Procedure
1. Start the utility by typing pdadmin at a command prompt. The pdadmin
command is located in the /PolicyDirectory Installation path/bin directory.
2. Log in to a secure domain as the sec_master administration user to use the
utility.
a. At the command prompt, type login.
b. Type sec_master when prompted for a user ID.
c. Specify the associated password at the Enter Password prompt.
For example:
pdadmin> login
Enter User ID: sec_master
Enter Password: password
pdadmin>
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Use Security Identity Manager to provision the IBM Security Access Manager user
accounts.
This example defines myaccount as an identical user account for both applications.
Use identical user accounts for both the IBM Security Access Manager and IBM
Security Identity Manager. Otherwise, you must configure the user account
mapping.
Procedure
1. On the computer on which IBM Security Access Manager is installed, start the
IBM Security Access Manager utility. Type pdadmin at a command prompt. This
prompt can be on the IBM Security Access Manager Authorization Server or
the IBM Security Access Manager Policy Server. You can also use IBM Security
Identity Manager to provision IBM Security Access Manager user accounts.
2. Take the following steps:
a. Log in to a secure domain as the sec_master administration user to use the
utility.
b. At the command prompt, type login.
c. Type sec_master when prompted for a user ID.
d. Specify the associated password at the Enter Password prompt.
For example:
pdadmin> login
Enter User ID: sec_master
Enter Password: password
pdadmin>
3. Define the example myaccount user account on IBM Security Access Manager
with the user create command.
Create a group for the users who need access to the following IBM® Security
Identity Manager user interfaces:
v Administrative console.
v Self-service user interface.
v Identity Service Center.
Procedure
1. Create a group ITIM-Group for users who need administrative access, by typing
the following command:
group create ITIM-Group cn=ITIM-Group,o=ibm,c=us ITIM-Group
2. Create a group ITIM-Self-Service-Group for users who need self-service access,
by typing the following command:
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Procedure
1. Add user account myaccount to the group ITIM-Group by typing this command:
group modify ITIM-Group add "myaccount"
2. Add the IBM Security Access Manager user account myaccount to the group
ITIM-Self-Service-Group by typing the following command:
group modify ITIM-Self-Service-Group add "myaccount"
3. Add the IBM Security Access Manager user account myaccount to the group
ITIM-ISC-Group by typing the following command:
group modify ITIM-ISC-Group add "myaccount"
What to do next
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Procedure
1. Start the utility by typing pdadmin at a command line.
2. Log in to a secure domain as the sec_master administration user to use the
utility.
a. At the command line, type the text as login.
b. Type the ID as sec_master when prompted for a user ID.
c. Specify the associated password at the Enter Password prompt.
For example:
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Procedure
1. Start the utility by typing pdadmin at a command prompt.
2. Create an ACL requiring authenticated access to associate with the WebSEAL
junction.
Use the acl create acl_name command, where acl_name is the name of the
ACL being created.
For example, for administrative console access, type the following command:
pdadmin> acl create ITIM-ACL
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Procedure
1. Add groups to the ACL with the acl modify acl_name set group group_name
permissions command. For example, add the administrator group to its
corresponding ACL:
pdadmin> acl modify ITIM-ACL set group ITIM-Group Trx
where:
acl_name
Specifies the name of the ACL groups you want to add.
group_name
Specifies the name of the group you want to add.
permissions
Specifies one or more of the following permissions:
T Specifies traverse subdirectories.
r Specifies read.
x Specifies execute.
2. To allow unauthenticated users to only Traverse the directory, modify the ACL:
acl modify ITIM-ACL set any-other T
3. To modify the ACL to allow users who are not authenticated to only Traverse
the directory, type this command:
acl modify ITIM-ACL set unauthenticated T
4. To modify the corresponding ACL to allow ITIM-Self-Service-Group the
authority to Traverse directories and to also read and execute, type this
command:
acl modify ITIM-Self-Help-ACL set group ITIM-Self-Service-Group Trx
5. To modifyITIM-Self-Help-ACL to allow unauthenticated users to only Traverse
the directory, type this command:
acl modify ITIM-Self-Help-ACL set any-other T
6. To modify ITIM-Self-Help-ACL to allow users who are not authenticated to
only Traverse the directory, type this command:
acl modify ITIM-Self-Help-ACL set unauthenticated T
7. To modify the corresponding ACL to allow ITIM-ISC-Group the authority to
Traverse directories and to also read and execute, type this command:
acl modify ITIM-ISC-ACL set group ITIM-ISC-Group Trx
8. To modifyITIM-ISC-ACL to allow unauthenticated users to only Traverse the
directory, type this command:
acl modify ITIM-ISC-ACL set any-other T
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
Procedure
Associate the ACL with the attach junction_name acl_name command. The
command syntax is:
acl attach prefix/webseal_junction/url_path_prefix acl_name
where:
prefix Specifies the IBM Security Access Manager Object Space prefix for your
WebSEAL server.
Type the following command to see the prefix:
pdadmin> object list /WebSEAL
/WebSEAL/tam60-server-default
Procedure
1. From the top-level menu of the Appliance Dashboard, select Configure >
Advanced Configuration > Update Property to display the Update Property
page.
2. In the All properties tab, click Identity server property files.
3. Select ui.properties.
4. Select the enrole.ui.taiEnabled property name.
5. Click Edit.
6. Set the Property Value to true.
7. From the Server Control widget on the Appliance Dashboard, do these steps.
a. Select these servers and click Stop.
v Cluster Manager server
v Identity Manager server
b. Select these servers and click Start.
v Cluster Manager server
v Identity Manager server
What to do next
Configure WebSEAL.
Configuring WebSEAL
Configure WebSEAL to use the password of the IBM Security Access Manager user
that is created in the first task of this procedure.
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
What to do next
Log on to IBM Security Identity Manager Server with any defined IBM Security
Access Manager user ID.
Note:
1. You are logging in through the WebSEAL junction URI and not directly in to
IBM Security Identity Manager Server.
2. If you use basic authentication, you must close the browser when you log off to
end the current session.
The SSO application fetches the Lightweight Third Party Authentication (LTPA)
token from the Hypertext Transfer Protocol (HTTP) header. The LTPA token serves
as an identity token for using and maintaining the authenticated user information.
The token enables the user to access the resources without requiring to log in to
the IBM WebSphere Application Server again. The SSO application inserts this
token into the SOAP header and then makes a web service call.
The SSO application uses form-based login when it is not accessed from a
WebSEAL junction. IBM Security Identity Manager users can log in to the sample
application by using the same credentials as the IBM Security Identity Manager
account. The SSO application runs on the same WebSphere Application Server and
uses the ISIMSecurityDomain. When deployed in a separate server than IBM
Security Identity Manager, the SSO application must be configured to share the
IBM Security Identity Manager user registry. Upon successful authentication, the
When the SSO application is accessed from a WebSEAL junction, the TAI (Trust
Association Interceptor) prevents WebSphere security from requiring multiple
authentications. IBM Security Identity Manager users can log in to the sample
application by using the credentials from the WebSEAL authentication server.
Because the SSO application is deployed with the same ISIMSecurityDomain in the
same WebSphere Application Server, the SSO application can log in to IBM
Security Identity Manager seamlessly with the LTPA token from WebSEAL. When
run on a separate WebSphere Application Server, the SSO application must run
under a separate domain and the user security realm must be configured as a
trusted realm in the ISIMSecurityDomain.
The SSO application demonstrates that you can achieve SSO authentication with
the IBM Security Identity Manager web services in various deployment scenarios
by using the WS-Security header. Modify the SOAP message to add the
WS-Security header BinarySecurityToken. The BinarySecurityToken element has
the LTPA identity token embedded. Provide the WS-Security header with the actor
attribute, http://services.itim.com/60/actor, to enable the IBM Security Identity
Manager web services for processing the security header. Modify the SOAP
message with the outgoing request of the ClientHandler.
You must install the IBM WebSphere Application Server fixes that are specified in
the IBM Security Identity Manager Release Notes. Use the installation instructions
in the Release Notes to install the fixes. Install the SSO application on the IBM
WebSphere Application Server where the IBM Security Identity Manager is
installed.
Procedure
1. Build the SSO application to create the itim_ws.war file. For information about
building the application, see “Building the SSO application” on page 47.
2. Install the application by using the IBM WebSphere Application Server
administrative console.
What to do next
The SSO application works only with its own authentication by using the IBM
Security Identity Manager user registry. You must enable authentication with
WebSEAL.
Procedure
1. Follow the instructions in “Configuration of IBM Security Identity Manager for
single sign-on with Application server Trust Association Interceptor and IBM
Security Access Manager WebSEAL” on page 29 Use the following
modifications for web services.
2. Create an ACL that requires authenticated access to associate with the
WebSEAL junction. For example,
pdadmin> acl create SSOAPP-ACL
3. Grant access to the ACL. For example,
Familiarize yourself with the SSO application details and installation requirements
before you install it.
You must install the IBM WebSphere Application Server fixes that are specified in
the IBM Security Identity Manager Release Notes. Use the installation instructions
in the Release Notes to install the fixes. Install the SSO application on the IBM
WebSphere Application Server where the IBM Security Identity Manager is
installed.
When the SSO application is installed on a separate system, the IBM Security
Access Manager is positioned as a single sign-on front. It returns an LTPA token
from the WebSphere Application Server or the IBM Security Access Manager
depending on if the junction has LTPA enabled.
What to do next
The SSO application works only with its own authentication by using the IBM
Security Identity Manager user registry. You must enable authentication with
WebSEAL.
Procedure
1. Follow the instructions in “Configuration of IBM Security Identity Manager for
single sign-on with Application server Trust Association Interceptor and IBM
Security Access Manager WebSEAL” on page 29 Use the following
modifications for web services.
2. On the server where the SSO application is installed, configure a Trust
Association Interceptor for the application security domain. For example,
APPSecurityDomain
Perform these steps on the WebSphere Application Server where the SSO
application is installed.
Procedure
1. Log on to the WebSphere Application Server administrative console. For
example,
http://localhost:9060/ibm/console
2. Click Applications > Enterprise Applications.
3. If itim_ws_war is not already started, then select the itim_ws_war check box.
4. Click Start.
Procedure
1. Use one of the following URLs to access the SSO application with a web
browser.
v Use the URL http://hostname:9080/itim_ws/jsp/Home.jsp
v If you enabled SSL, use the URL https://hostname:9443/itim_ws/jsp/
Home.jsp
v If you configured WebSEAL to authenticate, use the URL https://WebSEAL
Proxy/junction name/itim_ws/jsp/Home.jsp.
The hostname is the name of the host where the SSO application is installed.
2. Display the Webservices Call page.
a. Log in to IBM Security Identity Manager.
b. Specify the server host and port on which the IBM Security Identity
Manager web services are deployed.
WS Host
The host name or IP address of the server on which the IBM
Security Identity Manager is deployed.
WS Port
The server port on which the IBM Security Identity Manager web
services are available. For example, 9080.
3. Click Get Principal User to invoke the web service to fetch information about
the logged in user.
Before you compile the examples, the WAS_HOME environment variable must be set
to the WebSphere Application Server home directory.
To build only the SSO application, specify sso_sample as the target when you build
the examples. For example, when you issue the build sso_sample command on
Windows operating systems, or the ./build.sh sso_sample command on UNIX
operating systems, it creates the itim_ws.war file.
You must re-create the itim_ws.war file if you change the source of the SSO
application.
Procedure
1. Log in as a user in the IBM Security Identity Manager.
2. Open a command prompt.
3. Change directories to ITIM_HOME/extensions/RELEASE_VERSION/examples.
4. Compile the source code. Type one of the following commands
v On Windows operating systems
build
v On UNIX operating systems
build.sh
The command compiles the Java classes into the following files.
v ITIM_HOME/extensions/RELEASE_VERSION/lib/examples.jar
v ITIM_HOME/extensions/RELEASE_VERSION/examples/self_care/itim_expi.war
v ITIM_HOME/extensions/RELEASE_VERSION/examples/selfregistration/sr.war
v ITIM_HOME/extensions/RELEASE_VERSION/examples/ws/SSOSample/itim_ws.war
What to do next
Some examples require that the examples.jar file is available on the classpath of
the application server. See “Adding the examples.jar file to the class path”
Procedure
1. Stop the IBM Security Identity Manager application.
2. Add the examples.jar file to the ITIM_LIB WebSphere shared library.
a. Log in to the WebSphere administrative console.
b. Click Environment > Shared Libraries
c. Click ITIM_LIB.
d. Scroll down to the bottom of the list. Add the line $ITIM_HOME/extensions/
RELEASE_VERSION/lib/examples.jar
e. Click OK and then click Save.
3. Start the IBM Security Identity Manager application for the changes to take
effect.
Procedure
1. Make sure that administrative security is enabled for the profile on which the
SSO application is to be installed.
2. Create a folder that is named classes, if it does not exist, in
WAS_HOME/profiles/profile_name folder on which SSO application is
deployed.
Copy the itim_server.jar, itim_common.jar, and jlog.jar files from
ISIM_HOME/lib to the WAS_HOME/profiles/profile_name/classes folder on the
WebSphere Application Server client.
3. Copy the following property files from ISIM_HOME/data to the
WAS_HOME/profiles/profile_name /properties folder on the WebSphere
Application Server client.
v enRole.properties
v enRoleAuthentication.properties
v enRoleLDAPConnection.properties
Specify the IBM Security Identity Manager LDAP server in the url
java.naming.provider.url field. Use the IP address or machine name, such
as java.naming.provider.url=ldap://10.88.36.209:389.
v Properties.properties
v tmsMessages.properties
4. Create a data folder in the WAS_HOME/profiles/profile_name folder on the
WebSphere Application Server client.
5. Copy the ISIM_HOME/data/keystore folder to the WAS_HOME/profiles/
profile_name/data folder on the WebSphere Application Server client.
6. Restart the WebSphere Application Server client/server.
7. Log in to the WebSphere Application Server client. On WebSphere
administrative console, click Global security > Security Domains > Copy
Global Security.
8. Enter the information for IBM Security Identity Manager Security Domain.
9. Click OK and save the changes to the master configuration.
10. Configure the security domain.
a. Go to Security Domain > ISIMSecurityDomain. Specify server1 as the
scope of the domain. Click OK and save the changes to the master
configuration.
b. Go to Security Domain > ISIMSecurityDomain > Security Attributes >
Application Security. Select the option Customize for this domain and
check the checkbox Enable Application Security. Click OK and save the
changes to master configuration.
c. Go to Security Domain > ISIMSecurityDomain > User Realm. Select
Standalone custom registry.
d. Click Configure. Enter the realm name and custom registry class name.
Select Ignore case for authorization.
e. Click OK and save the changes to master configuration.
Depending on how your system administrator customized your system, you might
not have access to this task. To obtain access to this task or to have someone
complete it for you, contact your system administrator.
protocol://host_name/junction_name/url_path_prefix
protocol
Specifies the type of protocol that you want to use. Your choices are http or
https.
host_name
Specifies the name of the computer on which the IBM Security Access
Manager WebSEAL server is installed.
junction_name
Specifies the name of the WebSEAL junction.
url_path_prefix
v For the Administrative console, specify itim/console.
For example, type:
http://TAM60-Server/ITIMServer/itim/console
Procedure
1. Open IBM Cognos Configuration.
2. In the Explorer window, under Security, right-click Authentication.
3. Click New resource > Namespace.
4. In the Name box, type a name for your authentication namespace.
5. In the Type list, click LDAP-General default values.
6. Click OK. The new authentication namespace resource appears in the Explorer
window, under the Authentication component.
7. In the Properties window, for the Namespace ID property, specify a unique
identifier for the namespace.
55
9. If you do not use external identity mapping, use bind credentials to search an
LDAP directory server. Complete the following items.
v Set Use external identity to False.
v Set Use bind credentials for search to True.
v Specify the user ID and password for Bind user DN and password.
10. To configure an LDAP advanced mapping properties, see the values that are
specified in the following table.
Table 5. LDAP advanced mapping values
Mappings LDAP property LDAP value
Folder Object class organizationalunit, organization, and container
Description description
Name ou, o, and cn
Group Object class groupofnames
Description description
Member member
Name cn
Account Object class inetorgperson
Business phone telephonenumber
Content locale (leave blank)
Description description
Email mail
Fax/Phone facsimiletelephonenumber
Given name givenname
Home phone homephone
Mobile phone mobile
Name cn
Pager phone pager
Password userPassword
Postal address postaladdress
Product locale (leave blank)
Surname sn
Username uid
Results
What to do next
Create the users in an LDAP. See “Creating users in an LDAP” on page 57.
Procedure
1. Open an LDAP utility. For example, if you are using the IBM Directory Server,
the LDAP utility is idsldapadd.
2. Import the sample file LdapEntries.ldif that lists all the users who are
authorized to access the reports. See the following example.
Results
After the successful import operation, you can see the users that are created in
ou=users,ou=SWG.
Example
In this example, dc=com is the root entry. Specify the entry according to the schema
that you use.
dn: ou=SWG, dc=com
ou: SWG
objectClass: top
objectClass: organizationalUnit
Chapter 10. Security layer configuration around the data model and reports 57
dn: uid=lucy,ou=users,ou=SWG, dc=com
userPassword:: hello123
uid: lucy
objectClass: inetOrgPerson
objectClass: top
objectClass: person
objectClass: organizationalPerson
sn: Haye
cn: Lucy
What to do next
A user who has the system administrator privileges can grant the access.
Initially, all users are the members of the system administrator. Therefore, you can
log in with your LDAP user authentication in IBM Cognos and access the
administration section before you restrict the administration access.
Procedure
1. Log in to IBM Cognos with an LDAP user whom you want to assign the
system administrator role.
2. Go to Launch, and click IBM Cognos Administration.
3. Click the Security tab.
4. In the Users, Groups, and Roles section, click Cognos.
5. Navigate to System Administrator role.
6. Click the More link.
7. Under Available actions, click Set properties.
8. Click the Members tab.
9. Click the Add link.
10. Under Available entries section, click an LDAP namespace.
11. Select the Show users in the list check box.
Results
An LDAP user is added with the system administrator role.
What to do next
Create a role and add LDAP users as the members to that role. See “Creating a
role and adding LDAP users as members.”
Procedure
1. Log in to IBM Cognos with an LDAP user who has the system administrator
privileges. For example, PortalAdmin.
2. Go to Launch, and click IBM Cognos Administration.
3. Click the Security tab.
4. In the Users, Groups, and Roles section, click Cognos.
5. Click the New Role icon from the palette.
6. Specify the name for a role. For example, ISIMAuditor.
7. Add the description and the screen tip.
8. Click Next.
9. Under Select the members, click Add.
10. Under Available Entries Directory, click an LDAP namespace.
11. Select the Show users in the list check box.
12. Select the users whom you want to add as the members to the role and make
it into selected entries list.
13. Click OK.
14. Click Finish.
Results
A new role is created and LDAP users are added as the members to the new role.
Chapter 10. Security layer configuration around the data model and reports 59
Defining an access to the report by using a role
You can define an access to the report by using a role. All the members of a role
can access the report or reports.
Procedure
1. Log in to IBM Cognos with an LDAP user who has the system administrator
privileges. For example, PortalAdmin.
2. Under Public Folders, click SAReportingmodel_6.0.
3. Click the More link on the Actions toolbar that is associated with the report
for which you want to provide the access.
4. Under Available actions, click Set properties.
5. Click the Permissions tab.
6. Select the Override the access permissions acquired from the parent entry
check box.
7. Click Add link at the bottom of the list of entries.
8. Click Cognos.
9. Select the role that you want to add and make it to the selected entries.
10. Click OK.
11. Select the role and grant the permissions.
12. Optional: Remove other roles for which you do not want to provide the
access.
13. Click OK.
Results
An access is defined to the report by using a role and all the members of a role can
access the reports.
Procedure
1. Log in to IBM Cognos with an LDAP user who has the system administrator
privileges. For example, PortalAdmin.
2. Under Public Folders, click the More link on the Actions toolbar that is
associated with the report package SAReportingmodel_6.0.
3. Under Available actions, click Set properties.
4. Click the Permissions tab.
5. Select the Override the access permissions acquired from the parent entry
check box.
6. Click the Add link at the bottom of the list of entries.
7. Click Cognos.
8. Select the role that you want to add and make it to the selected entries.
9. Click OK.
10. Select the role and grant the permissions.
11. Optional: Remove other roles for which you do not want to provide the
access.
12. Click OK.
An access is defined for the reporting package by using a role and the members of
a role can access the reporting package.
Chapter 10. Security layer configuration around the data model and reports 61
62 IBM Security Identity Manager Version 7.0.1.7: Security Topics
Index
A G separate systems
single sign-on 49
access group setup, user authentication 55
IBM Security Identity Manager define 34 single sign-on 40
consoles 50 enabling authentication with
access control WebSEAL
reports 58
access reports, defining 60
H same system 43
HTTP server 24 separate system 46
account installing
define 33 same system 42
mapping 30
ACL 39 I separate system 44
starting 47
access 38 IBM HTTP server 25 testing 47
define 37 IBM Security Identity Manager server web services 41
adapter 13 configure 22 WebSphere Application Server
administrator iKeyman utility 18 preparation 49
access restriction 58 SSL 9, 25, 26
Application server 25 configure 20
Application server security 1
authentication
L SSL authentication, one-way,
LDAP two-way 8
IBM Cognos reports 55 SSL communication 7
creating users 57
authorization SSL configuration
LDAP namespace
IBM Cognos reports 55 example 17
configuration 55
logoff page preparation 18
Security Identity Manager Console SSL implementation 9
B changing 31 SSL terminology 7
backend server 32 SSL client 7
SSL communication 22
M test 23
C members, adding 59
SSL server 7
certificate 11 middleware 17
class path
adding the examples.jar file 48 T
clustered environment 9
command
P Trust Association Interceptor 29
pdadmin 35
example 51
pdadmin utility 37
single sign-on 51
protocol 50 U
communication 13, 15 ui.properties 40
configuration 17 user
configure 29
database server 20 R create 32
user account
single sign-on 29 references add 35
SSL 20 security configuration 61 user authentication
custom application 15 report package setup 55
defining access 60 user registry
reports Application server 3
D access control 58
define access 60
directory server 20
roles
creating 59 W
web services
E enabling authentication with
examples.jar file 48
external user registry 3
S WebSEAL
same system 43
secure environment separate system 46
practices 5 in a single sign-on environment 41
security 24
F security configuration references 61
installing single sign-on
same system 42
file types 11 security layer configuration 55 separate system 44
form-based authentication 40 self-signed certificate 18 single sign-on for separate
systems 49
63
web services (continued)
starting single sign-on 47
testing single sign-on 47
WebSEAL 29, 32, 40
WebSEAL junction 35
associate 39
WebSphere Application Server
plug-in 26
Printed in USA