Verifyaccess Admin 0
Verifyaccess Admin 0
Verifyaccess Admin 0
Version 10.0.6
June 2023
Administration topics
IBM
Contents
Figures................................................................................................................. ix
Tables.................................................................................................................. xi
Chapter 1. Overview.............................................................................................. 1
Activation level overview............................................................................................................................. 1
Tips on using the appliance......................................................................................................................... 3
iii
Viewing IP addresses.................................................................................................................................44
Viewing certificate expiry.......................................................................................................................... 44
Viewing partition information.................................................................................................................... 45
Viewing network traffic.............................................................................................................................. 45
Viewing the status of the appliance in Docker.......................................................................................... 45
Configuring the dashboard........................................................................................................................ 46
Chapter 6. Monitoring.......................................................................................... 47
Viewing the event log.................................................................................................................................47
Forwarding logs to a remote syslog server............................................................................................... 47
Viewing memory statistics.........................................................................................................................48
Viewing CPU utilization.............................................................................................................................. 49
Viewing storage utilization.........................................................................................................................50
Viewing application interface statistics.................................................................................................... 50
Viewing application log files...................................................................................................................... 51
Managing tracing specification..................................................................................................................52
Chapter 7. System............................................................................................... 55
Updates and licensing................................................................................................................................55
Installing updates.................................................................................................................................55
Installing a fix pack.............................................................................................................................. 56
Managing firmware settings................................................................................................................. 56
Managing trial settings......................................................................................................................... 57
Installing an extension......................................................................................................................... 57
Network Settings....................................................................................................................................... 58
Configuring general networking settings............................................................................................. 58
Configuring DNS................................................................................................................................... 58
Configuring interfaces.......................................................................................................................... 59
Appliance port usage............................................................................................................................61
Configuring aggregated network interfaces........................................................................................ 63
Configuring static routes...................................................................................................................... 64
Testing the connection......................................................................................................................... 65
Managing hosts file...............................................................................................................................67
Managing the shared volume............................................................................................................... 67
Managing packet tracing...................................................................................................................... 68
Creating a cluster................................................................................................................................. 69
Managing cluster configuration............................................................................................................70
Managing Distributed Session Cache in Docker.................................................................................. 86
Managing database configuration in Docker....................................................................................... 87
System settings..........................................................................................................................................88
Configuring date and time settings...................................................................................................... 88
Configuring administrator settings...................................................................................................... 88
Configuring tracing for the local management interface.....................................................................89
Configuring management authentication............................................................................................ 91
Managing roles of users and groups.................................................................................................... 93
Viewing and updating management SSL certificates.......................................................................... 96
Managing users and groups................................................................................................................. 96
Managing advanced tuning parameters.............................................................................................. 97
Managing snapshots.......................................................................................................................... 102
Managing support files.......................................................................................................................103
Configuring system alerts.................................................................................................................. 104
Restarting or shutting down the appliance....................................................................................... 107
Setting the locale of application log files...........................................................................................108
Configuring SNMP monitoring............................................................................................................108
Configuring password quality............................................................................................................ 109
Auxiliary Configuration Files.............................................................................................................. 110
Secure settings........................................................................................................................................ 111
iv
Managing SSL certificates.................................................................................................................. 111
Managing file downloads................................................................................................................... 118
v
AAC Specific Configuration................................................................................................................ 182
FIDO2 Specific Configuration............................................................................................................ 182
Federation Specific Configuration..................................................................................................... 182
Limitations..........................................................................................................................................183
vi
Chapter 17. Junctions........................................................................................239
Creating virtual junctions.........................................................................................................................239
Creating standard junctions.................................................................................................................... 240
Managing standard and virtual junctions ............................................................................................... 242
vii
Clearing a log file..................................................................................................................................... 280
Managing transaction logging components and data files .................................................................... 280
Managing reverse proxy log files............................................................................................................. 281
Managing authorization server log files.................................................................................................. 282
Index................................................................................................................ 323
viii
Figures
1. Product activation levels for the IBM Security Verify Access product.........................................................2
ix
x
Tables
1. Valid keys.....................................................................................................................................................28
2. Valid keys.....................................................................................................................................................29
6. Bonding modes............................................................................................................................................63
xi
24. Supported tags........................................................................................................................................142
25. Example commands for some common Docker Compose tasks.......................................................... 161
27. WebSEAL features that the appliance does not support....................................................................... 185
30. .................................................................................................................................................................209
xii
Chapter 1. Overview
The IBM Security Verify Access Appliance is a network appliance-based security solution that provides
both access control and protection from web-based threats.
The main features of the appliance include:
• A dashboard for viewing system status such as system notifications and disk usage.
• Analysis and diagnostics tools such as event logs, memory statistics, and CPU utilization.
• Centralized management of settings such as runtime components configuration files, and SSL
certificates.
• Control of system settings such as updates, licenses, and network settings.
Most of the features are configurable by using the local management interface (LMI).
The hardware appliance consists of the hardware and preinstalled IBM Security Verify Access Appliance
firmware. The preinstalled firmware software can also be obtained separately as a virtual appliance image
that you can deploy in a hypervisor environment.
For information about specifications for both the hardware appliance and virtual appliance, see System
Requirements.
Figure 1. Product activation levels for the IBM Security Verify Access product
2 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Tips on using the appliance
These tips might be useful during the administration of the appliance.
Backup
It is important to back up your appliance frequently. To back up the appliance, use the snapshot facility
that is provided by the appliance.
A snapshot is a copy of the state of the appliance at a certain time. By using snapshot files, you can back
up your appliance and restore the appliance later. It is a good practice to take snapshots regularly and
download them from the appliance to serve as backups. However, snapshots can consume much disk
space and as such it is best to clean up the old snapshots regularly.
For details about working with snapshots, see “Managing snapshots” on page 102.
Session timeouts
Save your configuration updates in the local management interface (LMI) regularly to avoid any data loss
in the event of a session timeout.
LMI sessions expire after the duration of time that is specified by the Session Timeout field on the
Administrator Settings page. When a session timeout occurs, any unsaved data on the current page is
lost.
The administrator must monitor the remaining free disk space, and take the necessary actions to
ensure that there is adequate disk space. The appliance provides a Disk Usage dashboard widget for
administrators to monitor the current disk usage. For more information about managing disk space, see
“Viewing disk usage” on page 43.
Chapter 1. Overview 3
4 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 2. Getting Started
Complete the following tasks that apply to your appliance format.
Procedure
1. Connect the power cable to the appliance.
2. Connect Management Interface 1 to the network you want to use to manage the appliance.
3. Connect the network cables to the application interfaces.
4. Turn on the appliance.
Procedure
1. Connect the console device to the hardware appliance with a serial cable.
Note: Your appliance package might contain a USB serial console cable and a DB-9 serial console
cable, or the package might contain only a DB-9 serial console cable. If you use the USB serial console
cable and your PC does not recognize the cable, you might need to install the device driver.
The device drivers are available for download from http://public.dhe.ibm.com/software/security/
products/infrastructure_protection/USBDeviceDrivers or from the driver supplier at http://
www.prolific.com.tw/US/ShowProduct.aspx?p_id=225&pcid=41.
2. If you use a computer as the console device, connect to the appliance with Microsoft Hyperterminal or
another terminal emulation program by using the following settings:
Option Description
Communication Port Typically COM1
Emulation VT100
Bits per second 9600
Data bits 8
Parity None
Stop bits 1
Flow control None
3. Follow the instructions in “Common tasks” on page 25 to configure initial appliance settings.
Procedure
1. Create a new virtual machine with your VMware ESX or vSphere.
Note:
• The instructions for creating a virtual machine might differ depending on your VMware ESX or
vSphere version. See the VMware documentation that suits your version for specific instructions.
• Ensure that the virtual machine has enough allocated disk space to store the configuration and log
file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
6 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• Specify Virtual Machine Version 7 or later as your virtual machine version.
• Specify Linux as the guest operating system and Other 4.x Linux (64-bit) as the guest operating
system version. If there is an existing appliance on 3.x it is still supported and there is no need to
re-create the appliances if they are upgraded.
• The memory size has influence over how many WebSEAL instances can be created and how many
sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
• Each network adapter must be of the type E1000 or VMXNET 3. Use VMXNET 3 for better
performance.
• For SCSI controller, select LSI Logic Parallel.
• For Virtual Device Node, select SCSI (0:0).
• Diskette, COM ports, and LPT port must be enabled in the BIOS settings of the VM.
• VMware Tools on the appliance provide the following enhancements:
– VMware commands for graceful shutdown
– Improved monitoring
– Time synchronization with the host operating system unless an NTP server is configured
2. Configure the virtual machine to boot from the .iso file and then start the virtual machine.
Note: If the hard disk that is attached to the virtual machine already contains a Linux partition, the
installer always runs in interactive mode.
• To run the installer in silent mode, wait 10 seconds or press Enter. After the silent installation
completes, the virtual machine is shut down automatically. If you want to continue with setting up
the appliance, restart the virtual machine.
• To run the installer in interactive mode, enter interactive and then press Enter.
a. Enter YES to proceed with the installation. Alternatively if you do not want to proceed with the
installation, enter NO to move to the reboot prompt.
b. Examine the installation messages to ensure that the installation was successful. After the
installation process is complete, unmount the installation media and then press Enter to reboot
the appliance.
3. When the reboot operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
Procedure
1. Import the provided OVA file into VMware.
Note: The instructions for importing an OVA file might differ depending on your VMware product
version. See the VMware documentation that suits your version for specific instructions.
2. Start the virtual machine.
Procedure
1. In the local management interface of the appliance, select System > Secure Settings > File
Downloads.
2. Expand Common > Sample > Deploy.
3. Select the deploy_isva_to_vsphere.py file.
4. Click Export to save the file to your local drive.
5. Examine the script to determine the steps to deploy and run the virtual appliance. Help on the script
can be obtained by running the following command:
Note:
• Supported Python versions are 2.7 and 3.4.
• In Python versions 2.7.9, 3.4.3, or later, unverified SSL connections are disabled. Ensure that the
vSphere server certificate is present in the keystore that Python uses.
• Supported vSphere versions are 4.1, 5.0, 5.1, and 5.5.
• The pyVmomi library is required. It can be installed from the pip tool or from https://github.com/
vmware/pyvmomi.
• To run the script, you must have the genisoimage or mkisofs tools in your path.
6. Modify the script as needed.
Procedure
1. Create a new virtual machine.
Note:
8 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• The instructions for creating a virtual machine might differ based on the utility that you are using
to manage your virtual machines. See the KVM documentation that suits your version for specific
instructions.
• Ensure that the virtual machine has enough disk space that is allocated to store the configuration
and log file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
• The memory size has influence over how many WebSEAL instances can be created and how many
sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
• Each network adapter must be of the type E1000 or Virtio. Use Virtio for better performance.
• The hard disk drive must be configured as a Virtio disk device.
• If you use certain versions of the Virtual Machine Manager (virt-manager) software to create your
virtual machines, it might by default add some CPU definitions that are incompatible with the
appliance and thus cause deployment errors. To fix this issue, you can use one of the following
methods:
– From the Virtual Machine Manager console, open the VM definition. Go to Processor. Expand the
Configuration option and then change the value of the Model field to Clear CPU configuration.
Click Apply.
– From the virsh shell, edit the virtual machine definition (for example, edit isva_appliance).
Locate and then remove the <cpu>...</cpu> entry. Save the file.
2. Configure the virtual machine to start from the .iso file and then start the virtual machine.
• To run the installer in silent mode, wait 10 seconds or press Enter. After the silent installation
completes, the virtual machine is shut down automatically. If you want to continue with setting up
the appliance, restart the virtual machine.
• To run the installer in interactive mode, enter interactive and then press Enter.
Note: If the hard disk that is attached to the virtual machine already contains a Linux partition, the
installer always runs in interactive mode.
a. Enter YES to proceed with the installation. Alternatively if you do not want to proceed with the
installation, enter NO to move to the reboot prompt.
b. Examine the installation messages to ensure that the installation was successful. After the
installation process is complete, unmount the installation media and then press Enter to reboot
the appliance.
3. When the restart operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
Procedure
1. Create a new virtual machine.
Note:
• Ensure that the virtual machine has enough disk space that is allocated to store the configuration
and log file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
• The memory size has influence over how many Web Reverse Proxy instances can be created and how
many sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
Procedure
1. Create a new virtual machine with Microsoft Hyper-V.
Note:
• The instructions for creating a virtual machine might differ depending on your Windows version. See
the Hyper-V documentation that suits your version for specific instructions.
• Ensure that the virtual machine has enough allocated disk space to store the configuration and log
file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
• Specify Generation 1 as the virtual machine generation. The virtual appliance must be run as
Generation 1 virtual machine, Generation 2 virtual machines are not supported.
• The memory size has influence over how many Web Reverse Proxy instances can be created and how
many sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
• Each network adapter must be of the type Network Adapter. The Legacy Network Adapter type is
not supported.
• The Hard Drive and DVD Drive must be attached to IDE Controller 0 and IDE Controller 1,
respectively.
• The following Integration Services are supported:
– Operating system shutdown
– Time synchronization
– Heartbeat
2. Configure the virtual machine to boot from the .iso file and then start the virtual machine.
Note: If the hard disk that is attached to the virtual machine already contains a Linux partition, the
installer always runs in interactive mode.
• To run the installer in silent mode, wait 10 seconds or press Enter. After the silent installation
completes, the virtual machine is shut down automatically. If you want to continue with setting up
the appliance, restart the virtual machine.
10 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• To run the installer in interactive mode, enter interactive and then press Enter.
a. Enter YES to proceed with the installation. Alternatively if you do not want to proceed with the
installation, enter NO to move to the reboot prompt.
b. Examine the installation messages to ensure that the installation was successful. After the
installation process is complete, unmount the installation media and then press Enter to reboot
the appliance.
3. When the reboot operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
XenServer support
The Security Verify Access appliance can be installed on a XenServer hypervisor (version 6.2 and later).
The Security Verify Access appliance for XenServer is distributed as a pre-installed disk image of the
appliance in Virtual Hard Disk (VHD) format. The disk has a fixed size of 100 GB. It is recommended to
enable off-the-box logging and auditing to ensure that the disk is not consumed with log files. You can
also use the standard installation ISO images to install the virtual appliance on XenServer.
To deploy the VHD appliance image to XenServer, you can use either of the following methods:
• The XenCenter console
• XenAPI or xe command line
To install the virtual appliance from the .iso image, use the XenCentre console.
Procedure
1. In the XenCenter console, expand the XenCenter icon on the left.
2. Right-click the attached hypervisor and select Import.
3. In the Import Source window:
a) Click Browse.
b) Select the VHD image to be imported and click Open.
c) Click Next.
4. In the VM Definition window:
a) Specify the name, number of CPUs, and memory of the virtual machine.
Note: In most scenarios, assign the virtual machine at least one processor and 2 GB of memory.
These settings can be adjusted after the virtual machine starts running.
b) Click Next.
5. In the Location window:
a) Select the destination hypervisor from the drop-down list on the right.
b) Click Next.
6. In the Storage window:
a) Select Place imported virtual disks onto specified target SRs.
Procedure
1. Create a new virtual machine with XenCenter.
Note:
• Ensure that the virtual machine has enough disk space that is allocated to store the configuration
and log file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
• The memory size has influence over how many Web Reverse Proxy instances can be created and how
many sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
2. Configure the virtual machine to start from the .iso file and then start the virtual machine.
• To run the installer in silent mode, wait 10 seconds or press Enter. After the silent installation
completes, the virtual machine is shut down automatically. If you want to continue with setting up
the appliance, restart the virtual machine.
• To run the installer in interactive mode, enter interactive and then press Enter.
Note: If the hard disk that is attached to the virtual machine already contains a Linux partition, the
installer always runs in interactive mode.
a. Enter YES to proceed with the installation. Alternatively if you do not want to proceed with the
installation, enter NO to move to the reboot prompt.
b. Examine the installation messages to ensure that the installation was successful. After the
installation process is complete, unmount the installation media and then press Enter to reboot
the appliance.
3. When the restart operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
12 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Installing the virtual appliance by using XenAPI or xe command line
The virtual appliance can be installed by using the XenAPI or xe command line.
Procedure
1. In the local management interface of the appliance, select System > Secure Settings > File
Downloads.
2. Expand Common > Sample > Deploy.
3. Select the deploy_isva_to_xen.py file.
4. Click Export to save the file to your local drive.
5. Examine the script to determine the steps to deploy and run the virtual appliance. Help on the script
can be obtained by running the following command:
Note:
• Supported python versions are 2.79 and 3.4.3.
• This script has a dependency on the requests and pexpect modules.
• This script is not supported on the Windows platform.
6. Modify the script as needed.
Creating an Amazon Machine Image (AMI) from the Virtual Hard Disk (VHD)
file
Upload the appliance VHD image to Amazon EC2 and create an AMI so that it can be deployed in Amazon
EC2.
Procedure
1. Download and install the Amazon EC2 API Tools. You can download the tool from the Amazon EC2 API
Tools page.
2. Run the following commands in the specified sequence to upload the appliance VHD for XenServer to
Amazon EC2 and create an AMI.
14 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Sequence Command Description
1 ec2-import-volume Imports the appliance VHD
into Amazon EC2.
2 ec2-describe-conversion-tasks Monitors the ec2-import-
volume task to show when
the task is complete.
3 ec2-create-snapshot Creates a snapshot of the
imported disk image. This
snapshot is required during
the AMI registration process.
4 ec2-describe-snapshots Monitors the status of the
snapshot creation to show
when the snapshot task is
complete.
5 ec2-register Registers a snapshot as a
new AMI.
You must use the following
parameter values when you
register the AMI:
architecture:
x86_64
root device name:
/dev/xvda
virtualization type:
hvm
Procedure
1. Log in to the Amazon EC2 console.
2. Go to IMAGES > AMIs.
3. Select the AMI that you want to launch.
4. Click Launch.
5. In the Choose an Instance Type window, select an instance type and click Next: Configure Instance
Details.
Post-installation activities
After you install the appliance in Amazon EC2, complete these activities to enable data transmission to
Amazon CloudWatch or change the port on which the LMI listens.
Procedure
1. In the appliance local management interface, go to System > Updates and Licensing > Extensions.
2. Click New.
3. Select the extension file which was obtained from IBM Security App Exchange.
Note: The file which is downloaded from IBM Security App Exchange is a zip file, and the extension file
must first be extracted from this zip file.
4. Click Next.
5. Supply the requested information, including the Amazon CloudWatch agent RPM and signature files.
6. Click Install.
16 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Configuring the local management interface port
By default, Amazon EC2 supports running an instance with a single network interface. To run the
appliance with a single network interface, you might want to change the port on which the local
management interface listens so that it can be used by other services on the appliance, such as the
Web Reverse Proxy.
Procedure
1. In the appliance local management interface, go to System > System Settings > Advanced Tuning
Parameters.
2. Click New.
3. Enter lmi.https.port in the Key field.
4. In the Value field, enter the appropriate port so that the port on which the local management interface
listens can be used by other services on the appliance.
5. Click Save Configuration.
6. Deploy the changes.
Creating a custom size Azure compliant Virtual Hard Disk (VHD) file
IBM provides an Azure-compliant VHD file that can be used to deploy Security Verify Access to Azure.
Procedure
1. In the Hyper-V Manager, create a new virtual machine using the wizard. During the wizard:
a. When prompted to Specify Generation, select the Generation 1 option.
b. When prompted to Assign Memory, enter 2048MB or more. This amount can be changed later after
installation.
c. When prompted to Configure Networking, no network connection is required.
d. When prompted to Connect Virtual Hard Disk, create a new virtual hard disk. Set the size of the
virtual disk to the desired custom size. This size can not be changed after installation finishes.
e. When prompted for Installation Options, attach the Security Verify Access installation ISO.
2. Start the newly created virtual machine. The virtual machine boots from the Security Verify Access
installation ISO and automatically installs the Security Verify Access firmware. When this process is
complete, the virtual machine shuts down automatically.
3. Wait for the firmware to install and for the virtual machine to shut down.
4. On the Actions tab, click Edit Disk. The Edit Virtual Hard Disk Wizard is started. During the wizard:
a. When prompted to Locate Disk, select the VHD file associated with the virtual machine created
earlier.
b. When prompted to Choose Action, select the Convert option.
c. When prompted to Choose Disk Format, select VHD. Azure does not support the VHDX format.
d. When prompted to Choose Disk Type, select Fixed size. Azure does not support dynamically
expanding or thin-provisioned disks.
e. When prompted to Configure Disk, choose a new location to save the converted disk to.
5. After the Edit Virtual Hard Disk Wizard is complete, the newly converted VHD is ready to be uploaded
to Microsoft Azure.
Note:
• The Security Verify Access firmware must not be configured before preparing it to upload to Azure. If
the machine is not in the unconfigured state when first started on Azure, it will not correctly detect
the Azure environment.
• It is possible to convert the VHD using other methods, such as the Powershell extensions for
Hyper-V and qemu-img.
• The firmware installation must take place in a Microsoft Hyper-V environment. For example, you
can not install Security Verify Access in VMware and convert it to an Azure-appropriate VHD. The
hypervisor that the Security Verify Access firmware is installed in must be the same as its intended
execution environment. Microsoft Hyper-V Generation 1 is considered to be the same hardware as
Microsoft Azure by the Security Verify Access firmware.
• For details about the VHD requirements, see the General Linux Installation Notes topic on the
Microsoft Azure documentation website.
18 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Uploading an Azure-compliant VHD to Azure and creating an Azure Image
To deploy a virtual machine in Microsoft Azure, an Azure-compliant VHD file that contains the Security
Verify Access firmware must be uploaded to a storage account and then used to create an image. The
created image artifact acts as a template and can be deployed multiple times.
Procedure
1. Upload the VHD file using the Azure Portal.
a. In the Azure Portal, select Storage Accounts.
b. Select the storage account where the Security Verify Access VHD file will be uploaded to.
• If you do not have a storage account, click Add to create one.
• Note that the selected location will dictate where the image can be created and subsequently
deployed to.
c. Under BLOB SERVICE, select Containers.
d. Select a container to upload the Security Verify Access VHD file to.
• If you do not have a storage container, click Add Container to create one.
e. Click Upload and select the Azure-compliant Security Verify Access VHD file to upload.
• Ensure that the Blob type is set to Page Blob.
This process might take a long time depending on your network connection and the location of your
Azure storage account.
2. Create an image using the Azure Portal.
a. In the Azure Portal, select Images.
b. Click Add to create a new image.
i) Give the image a name. Remember that this image is a template that will later be deployed to a
virtual machine with a different name.
ii) Ensure that the location is the same as the location of your storage account.
iii) In the OS disk section:
a) Select Linux and the OS type.
b) Click Browse on the Storage Blob field. A new panel will list your storage accounts. Using
this panel, navigate through the storage account and container to locate the Security Verify
Access VHD that was uploaded.
iv) Click Create to begin the image creation process. This process typically takes minutes to
complete.
c. When the process has completed, return to the Images panel and verify that the new image was
created.
This image can now be used to deploy new Security Verify Access virtual machines in Azure.
Procedure
1. In the Azure Portal, select Images.
2. Select the previously created Security Verify Access image.
3. On the Overview panel, click Create VM.
a) On the Basics page:
i) Enter a name for the new virtual machine.
ii) Enter a user name, select the Password Authentication type and provide a password. You must
provide a user name and password for accessing the management console. When running on
Microsoft Azure, the default admin account is not created.
iii) Complete the form and click OK.
b) On the Choose a size page:
i) Select an appropriate size for the new virtual machine, keeping in mind that the recommended
minimums are 4 GB of memory and 4 CPU cores.
ii) Click Select to continue.
c) On the Settings page:
i) Configure the network settings.
Note: It is not possible to configure more than one network interface from the Azure Portal.
Additional interfaces can be added using the Azure CLI 2.0 or equivalent.
ii) Click OK to continue
d) On the Summary page, revise the configuration and click OK to create the Security Verify Access
virtual machine.
20 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
– Attaching additional network interfaces is not supported.
• Disks
– Adding additional data disks is not supported.
• Extensions
– Installing extensions is not supported in Verify Access. This includes Microsoft's standard
extensions such as enablevmaccess, LinuxDiagnostic.
• Identity
Operations
• Backup
– Use the Verify Access snapshots functionality for back up or restore capabilities.
• Update management
• Inventory
• Change tracking
• Configuration Management
• Run Command
Monitoring
• Insights
• Diagnostic settings
– Boot diagnostics can be used to view the Serial log which displays the Microsoft Azure agent log
• Logs
Support and troubleshooting
• Reset password
Procedure
1. Select the hypervisor that you are using.
VMware
a. Open the vSphere Client and connect to the IBM Security Verify Access appliance.
b. Supply the host name and the user name and password.
c. Select the IBM Security Verify Access appliance from the list of VMs.
d. Select the Summary tab to view the number of CPUs assigned. In the General section of the
tab there is a line similar to the following entry.
CPU: 1 vCPU
e. Select the Resource Allocation tab to view the speed of the processors. The CPU section of the
tab displays information similar to the following entry:
f. Exit the VSphere Client. Retain this information for use in the next steps.
KVM
For more information, see the KVM documentation.
2. Consult the following document for specific instructions on how to calculate the PVUs for the target
application (the virtual appliance). See page 8 of the document:
http://public.dhe.ibm.com/software/passportadvantage/SubCapacity/x86_Scenarios.pdf
3. Use the data that you collect to place entries in the following spreadsheet. See the instructions within
the spreadsheet.
http://public.dhe.ibm.com/software/passportadvantage/SubCapacity/
Manual_Calculation_of_Virtualization_Capacity_Apr_2012.xls
4. Retain the spreadsheet and data in the event of a license compliance audit.
22 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• The appliance can be imported and managed in the Virtual Image Library, but cannot be extended with
the IBM Image Construction and Composition Tool.
• The appliance cannot be used in pattern-based deployments.
• The basic operations that are provided by Cloud Orchestrator for the imported appliance image include
the ability to stop, start, or delete the virtual machine.
• The appliance must be run with a single network interface.
To use the virtual appliance as an imported virtual image within a Cloud environment, use the following
high-level procedure. For more information, see the IBM Cloud Orchestrator Knowledge Center.
Procedure
1. Create a KVM virtual machine image and install the appliance firmware.
Note: After the installation is complete, remove the installation media and shutdown the machine. Do
not go through the first steps wizard before you deploy the image in the cloud.
See Installing the virtual appliance by using KVM for more detailed instructions.
2. Import the virtual image to the Cloud Orchestrator Virtual Image Library.
3. In the Virtual Image Library, check out the image to an operational repository in the KVM region where
you plan to deploy the appliance.
4. Use OpenStack to deploy the virtual image within this KVM region.
For example, to deploy the virtual image from the command line, perform these steps on the KVM
region server:
a. Set the environment variables for running OpenStack nova.
# source ~/openrc
# nova image-list
+--------------------------------------+---------------+--------+--------+
| ID | Name | Status | Server |
+--------------------------------------+---------------+--------+--------+
| 9ec1d9ec-2df9-44f6-938c-2533a4d48859 | isva | ACTIVE | |
+--------------------------------------+---------------+--------+--------+
c. Issue the nova boot command to start a new instance of the appliance image.
d. Monitor the status of the new instance using the nova list command.
# nova list
+--------------------------------------+--------------------+--------+--------------------
+
| ID | Name | Status | Networks
|
+--------------------------------------+--------------------+--------+--------------------
+
| 43f3e09c-a64d-4e11-8827-2d354be3d625 | my-isva-appliance | ACTIVE | public=172.20.96.1
|
+--------------------------------------+--------------------+--------+--------------------
+
e. The appliance is now started and the local management interface and web services interfaces are
listening on the given IP address.
5. After the machine is running in the OpenStack KVM environment, you can import it into Cloud
Orchestrator.
a. Log in to the Cloud Orchestrator management web UI.
b. Go to Configuration > Hypervisors.
Results
The appliance virtual machine is now visible in the Cloud Orchestrator UI on the Instances > Virtual
Machines page.
Related tasks
“Installing the virtual appliance by using KVM” on page 8
The use of Kernel-based virtual machine or KVM is supported. You can use KVM with the provided .iso
image so that you can run the virtual appliance.
lmt scan
When the scan is completed, the scan results are made available from the appliance Application Logfiles
page.
See Command-line interface for further details about accessing the command-line interface.
24 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Common tasks
These tasks are common for both the hardware appliance and the virtual appliance.
You can choose either of the following methods to configure initial appliance settings.
• Command-line interface (CLI)
• Local management interface (LMI)
The LMI method offers more advanced configuration options.
Navigation
You can move between screens in the wizard using the following options:
• p: Previous Screen
• n: Next Screen
To cancel the setup process at any time, use the exit command.
Modules
You must configure the following modules to set up your appliance:
Module Description
Welcome Describes the appliance settings that you can configure using the wizard.
Software License Describes the appliance license agreement, IBM terms, and non-IBM terms.
Agreement
FIPS 140-2 Mode Enable this option to turn on compliance for NIST SP800-131a. If you enable
Configuration this option, the appliance is automatically restarted before it continues on
with the rest of the setup.
Note: Enable this option only if you must comply with the NIST SP800-131a
requirements. There is no advantage to enabling this option if your installation
does not require it. To disable NIST SP800-131a compliance, you must
reinstall the appliance.
Procedure
1. Log in to the local management interface.
2. Click System > Updates and Licensing > Activated Modules.
3. Perform the following actions:
• Import the activation key and deploy the changes:
a. In the Activated Modules window, click Import under Activated products.
b. Browse to the activation key file that you downloaded from Passport Advantage.
c. Select the activation file.
d. Click Open.
e. Click Save Configuration.
f. Deploy the changes:
Note: You do not need to deploy changes immediately after you install the activation key.
However, you must deploy changes before you can take a snapshot of the product.
26 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
i) In the undeployed change message, click Click here to review the changes or apply them to
the system.
ii) Click Deploy.
g. The activated product name and version are displayed in the Products table. To view the software
license agreement, click: View Service Agreement.
Results
The menu in the local management interface refreshes to show the menu for the activated product.
Attention: Ensure that the activation is completed before attempting any other activities using the
local management interface.
Silent configuration
You can configure an appliance silently after installation with the web service interfaces by providing a
metadata image that contains essential configuration data.
After the appliance firmware has been installed, shut down the machine. The ISO image that contains the
configuration meta-data can then be attached to the appliance in preparation for the initial boot of the
installed firmware. Once the appliance has successfully booted, it will mount the ISO image and then use
the configuration meta-data to automatically configure the network.
The metadata image can be created with the local management interface or manually with a text editor.
If you use a manually created metadata image for the initial configuration of an appliance, the
appliance boots up with the configured network settings automatically, but the first-steps wizard must
be completed manually. You can use the local management interface or the web service interfaces to
perform the first-steps configuration. To silently configure the appliance without the need to complete
the first-steps wizard manually, you must use a metadata image that contains the system policy. Such
metadata images can be created only through the local management interface.
See the isva_config_sample.py script available from the File Downloads page of the local
management interface as an example for silent configuration with scripts.
Procedure
1. From the menu, select System > Secure Settings > Silent Configuration.
2. Enter the hostname to be configured on the new appliance.
3. Select the IPv4, IPv6, or both check boxes to specify static IP addresses.
• If the IPv4 checkbox is selected, complete the IPv4 section.
• If the IPv6 checkbox is selected, complete the IPv6 section.
4. To include the system policy, select the Include system policy checkbox .
Note:
Procedure
1. Create a text file with the name app-metadata at the root of the file system of the attached device.
2. Edit the content of the text file as needed.
The valid keys are as follows:
You can include both ipv4 and ipv6 settings in the same file. If you include ipv4 or ipv6 settings, all
associated keys (address, netmask, and gateway) must be present.
28 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
The following example initially configures an IPv4 address for interface 1.1 and the appliance
hostname.
network.hostname = isva-appliance.ibm.com
network.1.1.ipv4.address = 10.20.0.11
network.1.1.ipv4.netmask = 255.255.0.0
network.1.1.ipv4.gateway = 10.20.0.1
Related tasks
“Creating a metadata image with the local management interface” on page 27
You can create a metadata image that contains essential configuration data for the initial setup of an
appliance with the local management interface. This image can later be used for the silent configuration
of a new virtual appliance.
Procedure
1. Create a text file with the keys that are provided in Table 1.
2. Edit the content of the text file as needed.
The table lists the valid keys:
You can include both ipv4 and ipv6 settings in the same file. If you include ipv4 or ipv6 settings, all
associated keys (address, netmask, and gateway) must be present.
Upload the text file to the user-data field of a supported Cloud Provider when you provision a Verify
Access virtual appliance.
The following example initially configures an IPv4 address for interface 1.1 and the appliance
hostname.
network.hostname = cloudinit.verifyaccess.ibmsec.com
network.1.1.ipv4.address = 10.20.0.11
network.1.1.ipv4.netmask = 255.255.0.0
network.1.1.ipv4.gateway = 10.20.0.1
30 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 3. Initial configuration
Several initial configuration tasks are required for your IBM Security Verify Access environment.
After you complete the Getting started tasks, including activating the product, continue with these steps:
1. Manage application interfaces.
2. Configure your environment based on your needs:
Stand-alone Web Reverse Proxy
a. Configure the runtime environment.
b. Configure Web Reverse Proxy instances.
Member of a cluster of appliances
Primary master in a cluster:
a. Manage cluster configuration and specify an appliance to be the primary master.
b. Configure the runtime environment.
c. Configure Web Reverse Proxy instances.
Member of a cluster:
a. Manage cluster configuration and join the current appliance to the cluster.
b. Configure Web Reverse Proxy instances.
Front-end load balancer:
a. Configure the front-end load balancer.
Set up communication between appliances
Complete the following task if you have one appliance with Advanced Access Control activated and
one without it: Adding runtime listening interfaces.
Configure the Administrative User Registry:
If you want to enforce password policies for the administrative users, configure an external user
registry that implements the desired password policies as the administrative user registry. See
“Configuring management authentication” on page 91.
Proceed with additional configuration tasks as your environment requires.
Note: Do not connect the IBM Security Verify Access appliance to public telecommunications network
interfaces. Further certification might be required by law before you make any such connections. Do
not use the appliance in Public Services Networks. Contact IBM at IBM Customer Support for more
information.
32 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 4. Managing the appliance
The appliance provides three mechanisms by which it can be managed: the local management interface
(LMI), the command-line interface (CLI), and web services interface.
Command-line interface
Access the command-line interface (CLI) of the appliance by using either an ssh session or the console.
For additional information about accessing the CLI via an SSH session, see “SSH management interface”
on page 37.
The following example shows the transcript of using an ssh session to access the appliance:
Tip: Use the help command to display usage notes about a specific command.
The following example shows the options available under the lmi > accounts > locked menu.
webapp.vwasp.gc.au.ibm.com:locked> help
Current mode commands:
list List all of the locked accounts and the amount of time before each
of the accounts will be automatically unlocked.
unlock_all Unlock all of the locked accounts.
unlock <account> Unlock a specific account.
The following example shows the options available under the isam > logs menu.
webapp.vwasp.gc.au.ibm.com:logs> help
Current mode commands:
archive Archive the log files to a USB device.
delete Delete the log files which have been rolled over by the system.
delete_tmp Deletes files in the /tmp directory.
delete_trace Delete the trace files (trace, stats, translog) from the system.
monitor Monitor log files on the system.
ssl Works with the Verify Access SSL log files.
The following example shows the options available under the network menu.
webapp.vwasp.gc.au.ibm.com:network> help
Current mode commands:
arp Work with the ARP cache.
defgw Work with the default gateway.
dns Work with the appliance DNS settings.
hostname Work with the applaince host name.
interfaces Work with interface settings.
routes Work with the static routes.
The following example shows the options available under the routes menu.
webapp.vwasp.gc.au.ibm.com:routes> help
Current mode commands:
add Add a static route.
delete Delete a static route.
edit Edit a static route.
reset Reset all the routing tables.
show Show the static routes including both Active and Configured.
policy_db_dump {-f <db_name>} {-l [1|2]} {-g} {-n} {-q} {-s} {-r}
{-d <find-entry-name> [-c <replace-entry-name>[:<hostname}[:<principal>]}
-f <db_name> : Specifies the name of the policy database. This argument is optional
if there is only a single Verify Access domain.
-l [1|2] : The validation check level (2 is the default).
-g : Display the glossary information only.
-n : Display the object names only.
-q : Display the sequence number of the policy database.
-s : Display statistical information from the policy database.
-r : Validate and repair the policy database. The policy server will be
restarted as a result of this command.
-d: Locate an entry in the database. If the -c flag is also specified the
located entry is replaced with the new entry, otherwise the located
entry is deleted from the database. The policy server will be restarted
as a result of this command.
-c: Replace the located entry in the database. This flag can only be used
in conjunction with the -d flag. The policy server will be restarted
as a result of this command.
34 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
The following example shows the options available under the isam > aac menu.
webapp.vwasp.gc.au.ibm.com:aac> help
Current mode commands:
restart Restart the Advanced Access Control runtime.
The following example shows the options available under the tools menu:
webapp.vwasp.gc.au.ibm.com:tools> help
Current mode commands:
connect Test network connection to a certain port on a specified host.
connections Display the network connections for the appliance.
curl Test the connection to a particular Web server using curl.
database Get the connections currently open to the database.
ldapsearch Perform an LDAP search using the ldapsearch tool.
nslookup Query internet domain name servers.
ping Send an ICMP ECHO_REQUEST to network hosts.
session Test network sessions with TCP or SSL.
sockets Display the socket information for the appliance using
the Linux ss command.
telnet Connect to telnet server.
traceroute Trace a packet from a computer to a remote destination, showing
how many hops the packet required to reach the destination and
how long each hop took.
The following example shows the options available under the support menu:
webapp.vwasp.gc.au.ibm.com:support> help
Current mode commands:
create Create a support information file.
delete Delete a support information file.
download Download a support information file to a USB flash drive.
get_comment View the comment associated with a support information file.
list List the support information files.
list_categories List the categories registered for the support information file.
list_instances List the instances for a specific registered category.
purge Purge the support files from the hard drive.
set_comment Replace the comment associated with a support information file.
Note: The purge command deletes all core files, crashmap files, and support files from the /var/
support/ directory.
The following example shows the options available under the pending_changes menu:
webapp.vwasp.gc.au.ibm.com:pending_changes> help
Current mode commands:
discard Discard the pending changes for a particular user or all users.
list List all users who have outstanding pending changes.
The following example shows the options available under the diagnostics menu:
webapp.vwasp.gc.au.ibm.com:diagnostics> help
Current mode commands:
core_dumps Work with core dump files.
java_dump Generate {heap|system|thread} java dump for
{default|runtime} profile.
kill Kill the specified process. This command will wait for the
process to be terminated before returning.
list List the contents of the local filesystem.
monitor Generate monitoring output.
monitor_list Print a list of all available monitor items.
pidstat Report statistics for Linux tasks.
ps List the processes which are running on the system.
The method to access the console differs between the hardware appliance and the virtual appliance:
• For the hardware appliance, a serial console device must be used. For more information about attaching
a serial console device to the hardware, see “Connecting a serial console to the appliance” on page 5.
• For the virtual appliance, you can access the console by using the appropriate VMWare software.
For example, VMWare vSphere Client.
36 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
SSH management interface
The appliance offers an SSH management interface that provides remote access to the command line
(CLI) management interface by using an SSH session.
The SSH management interface provides access to the “Command-line interface” on page 33 (CLI).
All administrative users with access to the local management interface can also access the SSH
management interface.
In addition to the in-built admin user, this access includes all administrative users in:
1. The local management interface user registry.
See “Managing users and groups” on page 96.
2. A configured remote LDAP user registry.
See “Configuring management authentication” on page 91.
A customizable access banner can be presented on the local management interface login page. Use the
Login Screen Header and Login Screen Message properties on the Administrator Settings page to set the
access banner content.
Password-based authentication
Password-based authentication is enabled by default and can be disabled by setting SSH Password
Authentication to false in the Administrator Settings, see “Configuring administrator settings” on page
88.
Web service
The appliance can also be managed by sending RESTful web service requests to the appliance.
Only one user can remain logged in to the appliance at the same time. Each web service request
automatically displaces any existing sessions.
The following paragraphs are general notes about the usage of the web service interface. The content and
format of these web service requests are explained through the remainder of this document.
Note: The previous list contains only two headers that are mandatory for all web service requests. It is
not an extensive list of headers that are required for all request actions. The previous example shows
a curl GET request on a resource URI. This request requires only the two mandatory headers that are
listed. Other HTTP methods, such as POST or PUT, require more headers. The following example is a valid
request for starting a reverse proxy instance called inst1 using curl:
Notice the additional required header Content-type for the PUT operation.
Other HTTP clients, such as Java, might require more headers. For required headers for RESTful web
services, check the HTTP client documentation.
38 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Web service responses
The response to a web service call is composed of two components: HTTP response code and JSON
message.
The response to a successful web service request includes a 200 status code, and JSON data that
contains context-specific information about the request processing. The response to an unsuccessful web
service request includes an HTTP error response code, and JSON data that contains the error message.
https://{appliance_hostname}/isam/pending_changes/deploy
Method
GET
Parameters
N/A
Response
HTTP response code and JSON error response where applicable.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/deploy
Response:
200 ok
https://{appliance_hostname}/isam/pending_changes/forget
Method
GET
Parameters
N/A
Response
HTTP response code and JSON error response where applicable.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/forget
Response:
200 ok
https://{appliance_hostname}/isam/pending_changes/count
Method
GET
Parameters
N/A
40 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Response
HTTP response code and JSON data that represents the number of pending changes.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/count
Response:
{"count": 3}
https://{appliance_hostname}/isam/pending_changes
Method
GET
Parameters
N/A
Response
HTTP response code and JSON data that represents the list of pending changes.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes
Response:
200 ok
[{
"id": 0,
"policy": "SSL Certificates",
"user": "admin",
"date": "2012-11-05T11:22:20+10:00"
}]
Procedure
1. From the dashboard, locate the Notification widget.
Warning messages about the following potential problems are displayed:
• Certificates that are due to expire.
• The disk space utilization has exceeded the warning threshold.
• The CPU utilization has exceeded the warning threshold.
• There are pending changes, which have not been deployed.
• The external configuration database is not accessible.
• The external runtime database is not accessible.
• Reverse proxy instances that are not currently running. (This notification is not available when the
appliance is running in a Docker environment.)
• The database size has reached the warning threshold, which is 80% capacity. (This notification is not
available when the appliance is running in a Docker environment.)
• The time is not synced to the NTP server. (This notification is not available when the appliance is
running in a Docker environment.)
2. Take appropriate actions as required.
Procedure
1. From the dashboard, locate the Disk Usage widget.
Disk Space Pie Chart
Information about used disk space and free disk space is visualized in the pie chart.
Consumed Disk Space
How much space (in GB) is already used.
Note: Most of the disk space is typically used by log files and trace files. To minimize the disk
footprint, set the appliance to store log and trace files on a remote server. It is also a good practice
to clear unused log and trace files on a periodic basis.
Free Disk Space
How much space (in GB) is free.
Total Disk Space
How much space in total (in GB) is available to the appliance.
Note: The disk space in a hardware appliance is limited by the capacity of the hard disk drive it
carries.
2. Optional: Click Refresh to refresh the data.
Viewing IP addresses
You can view a categorized list of IP addresses that the appliance is listening on with the Interfaces
dashboard widget.
Procedure
1. From the dashboard, locate the Interfaces widget.
The IP addresses of all enabled and configured interfaces are displayed, along with the virtual IP
addresses that are managed by the front-end load balancer.
Management IPs
A list of IP addresses of the management interfaces that are enabled and configured.
Application IPs
A list of IP addresses of the application interfaces that are enabled and configured.
Load Balancer IPs
A list of IP addresses of the load balancer services.
2. Optional: Click Refresh to refresh the data.
Procedure
1. From the dashboard, locate the Certificate Expiry widget.
Details about the certificates are displayed.
Certificate Label
Label of the certificate.
Expiration
The date on which the certificate expires.
Type
Type of the certificate.
Key Database
Name of the key database that the certificate belongs to.
2. Optional: Click Refresh to refresh the data.
44 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Viewing partition information
You can view information about the active and backup partitions with the Partition Information widget.
Procedure
1. From the dashboard, locate the Partition Information widget.
Details about the active and backup partition are displayed.
Firmware Version
Version information of the appliance firmware
Installation Date
Date on which the appliance firmware was installed
Installation Type
Type of the appliance firmware installation
Last Boot
Time when the appliance was last booted
2. Optional: Click Firmware Settings to go the page to modify settings of the firmware.
Procedure
1. From the dashboard, locate the Network Traffic widget.
The In and Out traffic details for the past hour are displayed.
2. Optional: Click an interface name to display the details for a specific interface.
Procedure
1. From the dashboard, locate the Docker widget.
Deployment Model
Indicates that the appliance is running in a Docker container.
Version
The firmware version of the appliance.
Configuration Database
The status of the configuration database configuration.
Procedure
1. Click IBM Security Verify Access.
2. To rearrange the placement of the widgets, click the banner of a widget and drag it to where you want
it.
Note: Widgets snap to a grid layout on the dashboard and are automatically arranged when you move
one widget to the location of another.
46 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 6. Monitoring
You can monitor the health and statistics of the appliance.
Procedure
Click Monitor > Logs > Event Log.
The system events displayed. You can:
• Click Pause Live Streaming to stop the live updating of the event log.
• Click Start Live Streaming to resume live updating of the event log.
• Click Export to download the event log file.
Notes:
a. In the exported event log file, the time occurred (occurred) field shows the seconds since Epoch
(00:00:00 Universal time, 1 January 1970).
b. When you use the table filter on the Priority field, the values that can be filtered are in English only
(low, medium, and high). This behavior is expected on all language versions of the appliance.
Procedure
1. Click Monitor > Logs > Remote Syslog Forwarding.
2. Configure the remote syslog server settings as needed.
Adding a remote syslog server definition
a. Click Add.
b. Specify the details for the remote syslog server.
Server
The IP address or hostname of the remote syslog server to which messages are to be
forwarded.
Port
The port on which the remote syslog server is listening for requests.
Debug
If selected, additional debug information will be included in the log file for the remote
syslog forwarder process. The log file can be accessed from the rsyslog_forwarder
directory of the Viewing application log files page.
Protocol
The protocol which will be used to communicate with the remote syslog server.
Format
The format of syslog messages which are forwarded to the remote syslog server.
c. Click Save.
Specifying the log sources for a remote log server
a. Select the remote syslog server to send logs to.
b. Click Sources.
c. Click Add to add a log source.
d. Specify the details for the log source and then click OK.
Name
Name of the log source.
Instance Name
Name of the instance that the source log file belongs to. This field is available only if
WebSEAL or Azn_Server is selected in the Name field.
Log file
Name of the source log file. This field is available only if WebSEAL, Authorization Server,
Policy Server, or Runtime Logs is selected in the Name field.
Tag
The tag to add to the sent log entries.
Facility
The facility with which to send the log entries to the remote server. All messages will
be sent with the specified facility code. The available codes can be found at: https://
en.wikipedia.org/wiki/Syslog#Facility.
Severity
The severity of the sent log entries. All messages will be sent with the specified severity
level.
Note: The values are not saved on the server side until you click Save in Step f.
e. If you want to add multiple log sources, repeat the previous two steps.
f. Click Save.
Procedure
1. Click Monitor > System Graphs > Memory.
48 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
2. Select a Date Range:
Option Description
30 Minutes Displays data points for every minute during the last 30 minutes.
1 Hour Displays data points for every minute during the last 60 minutes.
12 Hours Displays data points for every minute during the last 12 hours.
1 Day Displays data points for every minute during the last 24 hours.
3 Days Displays data points for every 5 minutes during the last three days. Each data point is an
average of the activity that occurred in that hour.
7 Days Displays data points every 20 minutes during the last seven days. Each data point is an
average of the activity that occurred in that hour.
30 Days Displays data points for every hour during the last 30 days. Each data point is an
average of the activity that occurred in that hour.
3. In the Legend box, select Memory Used to review total memory utilization.
Procedure
1. Click Monitor > System Graphs > CPU.
2. Select a Date Range:
Option Description
30 Minutes Displays data points for every minute during the last 30 minutes.
1 Hour Displays data points for every minute during the last 60 minutes.
12 Hours Displays data points for every minute during the last 12 hours.
1 Day Displays data points for every minute during the last 24 hours.
3 Days Displays data points for every 5 minutes during the last three days. Each data point is an
average of the activity that occurred in that hour.
7 Days Displays data points every 20 minutes during the last seven days. Each data point is an
average of the activity that occurred in that hour.
30 Days Displays data points for every hour during the last 30 days. Each data point is an
average of the activity that occurred in that hour.
3. In the Legend box, select the CPU utilization data that you want to review:
• User
• System
• Idle
Chapter 6. Monitoring 49
Viewing storage utilization
View the storage graph to see the percentage of disk space that is used by the boot and root partitions of
the appliance.
Procedure
1. Click Monitor > System Graphs > Storage.
2. Select a Date Range:
Option Description
30 Minutes Displays data points for every minute during the last 30 minutes.
1 Hour Displays data points for every minute during the last 60 minutes.
12 Hours Displays data points for every minute during the last 12 hours.
1 Day Displays data points for every minute during the last 24 hours.
3 Days Displays data points for every 5 minutes during the last three days. Each data point is an
average of the activity that occurred in that hour.
7 Days Displays data points every 20 minutes during the last seven days. Each data point is an
average of the activity that occurred in that hour.
30 Days Displays data points for every hour during the last 30 days. Each data point is an
average of the activity that occurred in that hour.
Procedure
1. From the top menu, select Monitor > Network Graphs > Application Interface Statistics.
2. In the Date Range field, select the period to display the statistics for.
Option Description
30 Minutes Displays data for every minute interval in the last 30 minutes.
1 Hour Displays data for every minute interval in the last 60 minutes.
12 Hours Displays data for every minute interval in the last 12 hours.
1 Day Displays data for every 20-minute interval in one day.
50 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Option Description
3 Days Displays data for every 20-minute interval during the last three days.
7 Days Displays data for every 20-minute interval during the last seven days.
30 Days Displays data for every day during the last 30 days.
Procedure
1. From the top menu, select Monitor > Application Log Files.
The displayed directories contain the application log files that can be viewed and downloaded:
• access_control: Contains log files specific to the Advanced Access Control offering. It contains
subdirectories for different categories of log files, such as auditing, isamcfg, and runtime.
• cluster: Contains logs files for the cluster manager.
• management_ui: Contains log files for the management interface.
• federation: Contains logs files specific to the Federation offering.
By default, the log files are displayed in a tree view.
2. Optional: Click Details View to manage the log files using a more detailed view. This view shows the
path, file size, and last modified time of each log file. You can also order the files by name, path, file
size, or last modified time.
3. Optional: Click Refresh to get the most up-to-date data.
4. You can then view or download the displayed log files.
To view the log file
a. Select the file of interest.
b. Click View. The content of the log file is displayed. By default, the last 100 lines of a log file are
displayed if the file is longer than 100 lines. You can define the number of lines to display by
entering the number in the Number of lines to view field and then click Reload. Alternatively,
you can provide a value in the Starting from line field to define the start of the lines. If the
Starting from line field is set, then the Number of lines to view field determines how many
lines to view forward from the starting line. If the Starting from line field is not set, then the
Number of lines to view field determines how many lines to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
c. Optional: Click Export to download the log file.
To download the log file
a. Select the file of interest.
b. Click Export to save the file to your local drive.
c. Confirm the save operation in the browser window that pops up.
To clear or empty a log file
a. Select the file or files of interest.
b. Click Clear to clear the contents of the file.
c. In the confirmation window, click Yes to confirm the clear operation.
Chapter 6. Monitoring 51
To delete a log file
a. Select the file or files of interest.
Note: It is the administrator's responsibility to make sure that the log file to be deleted is not in
use by the system.
b. Click Delete to remove the log file.
c. In the confirmation window, click Yes to confirm the deletion.
Procedure
1. Select the Runtime Tracing link from the top of this page. You can also access this panel from the top
menu by selecting Monitor > Logs > Runtime Tracing.
2. Use one of the following ways to edit the trace level of a component.
• Select the component name from the Component list. Select the ideal trace level for this component
from the Trace Level list. Then, click Add. Repeat this process to modify trace levels for other
components if needed. To clear all of the tracing levels, click Clear.
To log all events, select ALL as the trace level.
Note: This setting increases the amount of data in logs, so use this level when necessary.
com.tivoli.am.fim.authsvc.*
com.tivoli.am.fim.trustserver.sts.modules.*
Table 4. Valid trace levels. The following table contains the valid trace levels.
Level Significance
ALL All events are logged. If you create custom
levels, ALL includes those levels and can
provide a more detailed trace than FINEST.
FINEST Detailed trace information that includes all
of the details that are necessary to debug
problems.
FINER Detailed trace information.
FINE General trace information that includes methods
entry, exit, and return values.
DETAIL General information that details sub task
progress.
CONFIG Configuration change or status.
INFO General information that outlines the overall
task progress.
AUDIT Significant event that affects the server state or
resources.
52 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Table 4. Valid trace levels. The following table contains the valid trace levels. (continued)
Level Significance
WARNING Potential error or impending error. This level can
also indicate a progressive failure. For example:
the potential leaking of resources
SEVERE The task cannot continue, but component,
application, and server can still function.
This level can also indicate an impending
unrecoverable error.
FATAL The task cannot continue, and component,
application, and server cannot function.
OFF Logging is turned off.
• Enter the name and value of the trace component in the Trace Specification field. To modify
multiple components, separate two strings with a colon (:). Here is an example.
com.x.y.*=WARNING:com.a.b.*=WARNING:com.ibm.isva.*=INFO
3. Click Save.
Chapter 6. Monitoring 53
54 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 7. System
Information about configuring Security, Network, and System settings of your appliance.
Installing updates
Install firmware updates to improve the appliance and the network protection that is provided by the
appliance.
Procedure
1. Click System > Updates and Licensing > Firmware Updates.
When a new firmware update is available, details about the firmware update including a download link
are presented on this page. Follow the download link to download the firmware update from IBM Fix
Central.
2. On the Firmware Updates page, use one or more of the following commands:
Option Description
Upload To upload an update, click Upload. In the New Update window, click Select Update,
browse to the update file, click Open, and then click Submit.
Note: After uploading an update, the installation must be started manually using the Install
command.
Procedure
1. In the local management interface, go to System > Updates and Licensing > Fix Packs.
2. In the Fix Packs pane, click New.
3. In the Add Fix Pack window, click Browse for fix pack: to locate the fix pack file, and then click Open.
4. Click Save Configuration to install the fix pack.
Procedure
1. Click System > Updates and Licensing > Firmware Settings.
2. On the Firmware Settings page, perform one or more of the following actions:
Option Description
Edit To edit the comment that is associated with a partition, select the partition and click
Edit.
Create Important: Create a backup of your firmware only when you are installing a fix pack
Backup that is provided by IBM Customer Support.
Fix packs are installed on the active partition and you might not be able to uninstall
the fix pack.
Note: The backup process can take several minutes to complete.
56 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Option Description
Set Active Set a partition active when you want to use the firmware that is installed on that
partition. For example, you might want to set a partition active to use firmware that
does not contain a recently applied update or fix pack.
3. Click Yes.
If you set a partition active, the appliance restarts the system using the newly activated partition.
Procedure
1. In the local management interface, go to System > Updates and Licensing > Trial.
2. Click Import.
3. Browse to the certificate and confirm the import operation.
Installing an extension
Install an IBM Security Verify Access extension in the environment.
Chapter 7. System 57
Note: Installation of the DynaTrace AppMon Agent extension requires the DynaTrace AppMon agent
JAR (third-party dependency file) from the DynaTrace website.
Procedure
1. From the dashboard, click System > Updates and Licensing > Extension.
2. In the Extensions pane, click New.
3. Upload the extension support file and click Next.
4. On the next dialogue box, provide the configuration parameter details and upload the third-party
dependency.
5. Click Install.
Network Settings
Information about configuring network interfaces and information about your appliance.
Procedure
1. From the top menu, select System > Network Settings > General.
2. Enter the host name.
Note:
• Changing the appliance host name causes the security device to reset the network connection. You
must reconnect after the network connection is reset. This process does not interrupt traffic through
the application interfaces.
• The system hostname is automatically added to the appliance hosts file. The appliance will associate
an available IPv4 management address with the system hostname. Alternatively, a particular IPv4
management address can be designated as the Primary Address to associate with the system
hostname in the hosts file. See Configuring interfaces for instructions to set a Primary Address.
3. Click Save Configuration.
Configuring DNS
Define the DNS settings for your interfaces.
Procedure
1. From the top menu, select System > Network Settings > DNS.
• To set the DNS via DHCP of an interface:
a. Select Auto.
b. Select the interface from the list.
• To use manual DNS settings:
58 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
a. Select Manual.
b. Define the following settings:
– Primary DNS (mandatory)
– Secondary DNS
– Tertiary DNS
– DNS Search Path
2. Click Save Configuration.
Configuring interfaces
Create or edit your management and application interfaces.
Procedure
1. From the top menu, select System > Network Settings > Interfaces.
All current management and application interfaces are displayed.
2. You can add or edit interfaces and addresses that are associated with an interface.
• To add an interface:
a. Click New.
b. On the General Configuration tab:
i) Select the type of interface to create.
Note: For interfaces of the type Loopback, DHCP and bonding options are not available.
ii) Enter a name for the interface.
iii) Select the Enabled check-box if you want to enable this interface at the same time when it is
created.
iv) Enter the virtual LAN ID for the interface.
v) Add notes about this interface in the Comment field.
c. Click Save Configuration to confirm the details of this interface.
• To modify the details of an interface:
a. Select the interface from the table.
b. Click Edit.
c. Modify the details as needed.
d. Click Save Configuration to confirm the modified details.
• To delete a virtual interface:
Chapter 7. System 59
a. Select the interface from the table.
b. Click Delete.
c. Click Yes to confirm the operation.
• To add an IP address to an interface:
a. Select the interface.
b. Click Edit.
c. On the IPv4 Settings tab:
i) If you want to use DHCP to assign addresses, select Auto.
a) To make this interface a management interface, select the Management Interface
checkbox. To make this interface an application interface, leave this check-box
unchecked.
b) Select the Provides Default Route if needed.
ii) If you want to use static addresses, select Manual.
a) Click New to add an address.
b) Enter the static address in the Address field in the format of <address>/<mask>. Masks
are supported in dot-decimal and CIDR notation, for example:
10.0.2.38/24
10.0.2.38/255.255.255.0
c) To use this address for management purposes, select the Management Address check-
box. To use this address for application, leave this check-box unchecked.
d) If this address is the primary address for this appliance, select the Primary Address
check-box. The primary address is the management address which will be associated with
the appliance hostname in the hosts file. Note that an appliance may only have a single
primary address.
e) By default, the appliance performs validation to ensure that overlapping subnets do
not span multiple interfaces. Such validation helps prevent networking issues in certain
environments. If you want to disable this validation for your environment, select the
Override the Overlapping Subnet Validation option.
f) Click Save Configuration to confirm the details.
d. On the IPv6 Settings tab:
i) If you want to use DHCP to assign addresses, select Auto.
a) To make this interface a management interface, select the Management Interface check-
box. To make this interface an application interface, leave this checkbox unchecked.
ii) If you want to use static addresses, select Manual.
a) Click New to add an address.
b) Enter the static address in the Address field in the format of <address>/<mask>. Masks
must be given in CIDR notation, for example:
2001:db8::38/48
c) To use this address for management purposes, select the Management Address check-
box. To use this address for application, leave this checkbox unchecked.
d) Click Save Configuration to confirm the details.
• To modify an IP address that is associated with an interface:
a. Select the interface.
b. Click Edit.
60 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
c. On the IPv4 Settings and IPv6 Settings tabs, select the address to modify and then click Edit.
d. Modify the settings as needed.
e. In the Edit address window, click Save Configuration to close the window.
f. Click Save Configuration to confirm the interface details.
• To delete an IP address that is associated with an interface:
a. Select the interface.
b. Click Edit.
c. On the IPv4 Settings and IPv6 Settings tabs, select the address to delete and then click
Delete.
d. Click Yes to confirm the delete operation.
e. Click Save Configuration to confirm the interface details.
Chapter 7. System 61
Table 5. Ports used on the appliance (listen ports) (continued)
Appliance port Appliance interface type Description
636 Administration This port is reserved for remote
SSL access to the embedded user
registry. The port is only active on
the primary master node of the
cluster when the Security Verify
Access runtime is configured to
use the embedded user registry.
2020+7 Administration This port is used by the appliance
DSC servers to replicate session
data between cluster master
nodes. Each master node must
have access to the port of its
adjacent node. The primary node
is adjacent to the secondary
node. The secondary node is
adjacent to the tertiary node. The
tertiary node is adjacent to the
quaternary node.
Note: The 2020+7 value
assumes that the cluster First
Port is set to its default value
2020. If the cluster First Port
is configured to a value other
than the default, this port value
must be adjusted relative to
the configured First Port value
(configured First Port+7).
62 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Table 5. Ports used on the appliance (listen ports) (continued)
Appliance port Appliance interface type Description
7234 Administration The Web Reverse Proxy server
listens on this port if it is running
on the node. This port must be
accessible from the node that is
running the policy server. This
value is the typical port that is
used for the first Web Reverse
Proxy on a node. This port can be
configured to a different value.
Note: Many services on the appliance can be configured to access external service ports such as LDAP,
SQL, DNS, NTP Web Reverse Proxy junctions, OCSP, Kerberos, and syslog server ports. The routing that
is configured on the appliance determines which outgoing interface is used to access them based on the
external service's IP address.
Chapter 7. System 63
Configuration options for these bonding modes are available through the appliance advanced tuning
parameters. If set, the parameters apply to all bonding interfaces. For more details, see “Managing
advanced tuning parameters” on page 97.
The bonding (enslave) order of the slaves is not configurable. The network device that is configured as the
primary bonding device uses its underlying physical device as the first bonded slave.
Note: Expect interruption to any existing network traffic on the involved interfaces when the configuration
changes are committed.
Procedure
1. From the top menu, select System > Network Settings > Interfaces.
2. Edit the appliance interface to be replaced by the virtual bonding interface behind which the
aggregation of interfaces is placed. The physical network interface that is normally represented by
this configuration is the first interface aggregated behind the bonding virtual interface.
a) Select the interface and then click Edit.
b) For this interface, set the Bonding Mode to something other than None or Slave.
For example, 802.3ad.
Note: Some bonding modes, such as 802.3ad, require equivalent support from the network switch
to which they are attached.
c) Set the IP addresses of the interface, if not already set. This interface configuration defines the IP
address of the aggregation.
d) Save the configuration.
3. Edit each additional interface to be added to the aggregation. For each slave:
a) Set the Bonding Mode to Slave.
Note: If you have an existing bonding configuration on an interface, you must set the bonding
configuration back to None and deploy the change before you can set the interface to be a slave.
That is, the Slave option does not appear when you list the available modes on an interface with
an existing bonding configuration. You must first clear the existing bonding configuration by setting
the bonding mode to None. After deploying the change, you can see the Slave option in the list.
b) For the Bonded To field, select the initial interface that was configured in previous steps.
c) Save the configuration.
4. Commit the changes.
Procedure
1. From the top menu, select System > Network Settings > Static Routes.
2. Select the route table to edit from the Route Table For field.
You can use these route tables to configure routes that are specific to requests destined for a
particular local IP address. Use the Default table if specific local IP address control is not required.
3. Take one of the following actions:
• Click New to create a route.
64 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• Select an existing route, and then click Edit to change the settings.
• Select an existing route, and then click Delete to remove it.
4. Define the following information in each field:
• Enabled
• Destination
Note: To make this route the default gateway, enter Default in the Destination field.
• Gateway
• Metric
• Interface
5. Click Save Configuration.
Procedure
1. From the top menu, select System > Network Settings > Test Connection.
2. You can test a TCP or SSL connection.
Testing a TCP connection
a. Select the TCP option.
b. Enter the server, port, and optionally the timeout value.
c. Click Test Connection. Any message that is generated as output of the connection test is
displayed at the bottom of the page.
Testing an SSL connection
a. Select the SSL option.
b. Enter the server, port, and optionally the timeout value.
Chapter 7. System 65
c. Select Show SSL Advanced Parameters to display additional SSL parameters that can be
specified.
d. Define any SSL additional parameters as needed.
66 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Managing hosts file
To manage hosts file with the local management interface, use the Hosts File management page.
Procedure
1. From the top menu, select System > Network Settings > Hosts File.
All current host records with their IP address and host names are displayed.
2. You can then work with host records and host names.
• Add a host record
a. Select the root level Host Records entry or do not select any entries.
b. Click New.
c. On the Create Host record page, provide IP address and host name of the host record to add.
d. Click Save.
• Add a host name to a host record
a. Select the host record entry to add the host name to.
b. Click New.
c. On the Add Hostname to Host Record page, enter the host name to add.
d. Click Save.
• Remove a host record
a. Select the host record entry to delete.
b. Click Delete.
c. On the confirmation page, click Yes to confirm the deletion.
• Remove a host name from a host record
a. Select host name entry to delete.
b. Click Delete.
c. On the confirmation page, click Yes to confirm the deletion.
Note: If the removed host name is the only associated host name for the IP address, then the
entire host record (the IP address and host name) is removed.
Procedure
1. From the top menu, select System > Network Settings > Shared Volume.
Chapter 7. System 67
All contents of the shared volume are displayed under the relevant directories.
fixpacks
Fix pack files.
snapshots
Snapshot files.
support
Support files.
2. You can upload, download, rename, or delete these files as needed.
3. Optional: Click Refresh to get the most up-to-date data.
Procedure
1. From the top menu, select System > Network Settings > Packet Tracing.
The status of packet tracing is displayed.
Note: The top grid shows the status of the packet tracing along with the details of the current PCAP
tracing file only. The bottom grid shows the details of the current PCAP tracing file along with any
existing rollover PCAP tracing files.
2. Manage packet tracing settings.
• Start packet tracing
a. Click Start.
b. On the Start Packet Tracing page:
i) Select the interface name in the Interface field.
Note: If no value is selected for the Interface field, packet tracing is enabled for all interfaces.
ii) Optional: Click the Filter field.
iii) Optional: On the Set Filter page, select a pre-defined filter in the Display Filter field, or enter
the filter manually in the Filter String field.
iv) Click Save.
v) Define the maximum size of the packet tracing file (PCAP file) in the Maximum File Size field.
This value is the maximum size that the packet tracing file can grow to before packet tracing is
disabled.
Note: If no value is selected for the Maximum File Size field, the maximum file size is set to
half the remaining disk size.
vi) Define the maximum amount of data (in bytes) to be collected for each frame in the snap
length field.
Note: The valid range for this field is 1 to 65535. If no value is specified, the snap length is set
to 65535 bytes.
vii) Define the maximum number of log rotation files in the maximum files field. If this number is
greater than 0, the number of log files created is limited to the specified number.
When the maximum number of files is reached the capture begins overwriting files from the
beginning, thus creating a 'rotating' buffer. With this 'rotating' buffer, packet capture does not
68 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
stop once the log files are full. If the value is set to 0 there is a single log file and when this file
is full, packet capture stops.
Note: The valid range for this field is 0 to 99. If no value is specified, the maximum files is set
to 0.
c. Click Start.
Note: Only a single packet tracing operation can be running at the same time. A new packet trace
cannot be started until the PCAP file from the previous trace is deleted.
• Stop packet tracing
a. Click Stop.
b. Click Yes to confirm the action.
• Export the packet tracing PCAP file
a. Select the trace file to export from the Packet Tracing Files grid.
b. Click Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
c. Confirm the save action in the browser pop-up window.
• Delete the packet tracing PCAP file
a. Click Delete.
b. Click Yes to confirm the action.
Note: If packet tracing is running, the PCAP file cannot be deleted. You must stop the associated
packet tracing before you delete the PCAP file.
The delete option deletes all the tracing files including the rollover files.
Creating a cluster
You can configure multiple appliances into a cluster that shares configuration information and runtime
information. Use the Cluster Configuration management page to administer cluster support for the
appliance.
Chapter 7. System 69
Procedure
1. Select an appliance to be the primary master. You can choose any appliance as the primary master if it
is not a member of another cluster. If the selected appliance is in another cluster, you must unregister
it before you can appoint it as the primary master of a new cluster.
2. On the General tab of the Cluster Configuration page:
a. Select the Multinode option.
b. Click Create Cluster.
c. In the Create Cluster window, configure the Cluster Identifier, and then click Create Cluster.
Note: For more information about the Cluster Identifier, see “Cluster general configuration reference”
on page 73.
3. Save and deploy this update. The chosen appliance is configured as the primary master of a cluster
that can contain multiple nodes.
4. Export the cluster signature file on the primary master. The cluster signature file contains configuration
information so that cluster members can identify and communicate with the primary master.
5. Join appliances to the cluster by importing the cluster signature file on each appliance that you want to
become a cluster member. The process of joining an appliance to the cluster is a registration.
6. Update the cluster configuration on the primary master. As part of the cluster configuration, you can
define more masters from the pool of registered nodes. For more information, see “Failover in a
cluster” on page 169.
7. Save and deploy the configuration changes.
Note: As a rule, try to limit the number of changes that are made to the cluster configuration in a single
policy update.
Related reference
“Cluster general configuration reference” on page 73
Use the Cluster Configuration management page to administer cluster support for the appliance.
“Session cache reference” on page 74
Use the Cluster Configuration management page to administer cluster support for the appliance.
“Runtime database” on page 80
You can view and update the current runtime database settings with the Runtime Database tab on the
Cluster Configuration management page.
70 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• These initial settings indicate that by default the appliance operates as a stand-alone cluster with a
single node.
• If you do not want this appliance to be the primary master, but rather a node in an existing cluster,
follow the steps in Join the current appliance to the cluster.
• When the Stand-alone option is selected, the First Port field is enabled and the fields under Masters
for All Services are disabled.
About the Multi-node option:
• To use this appliance as the primary master of a cluster with multiple nodes, you must set the Multi-
mode option.
• When the Multi-node option is selected:
– If the appliance is the primary master, the First Port field is enabled.
– If the appliance is not the primary master, the First Port field is disabled.
Note: Cluster configuration updates do not take effect until you deploy the changes through the local
management interface.
Procedure
1. From the top menu of the local management interface, select System > Cluster Configuration. A list
of the nodes in the cluster is under Nodes.
2. Take any of the following actions and click Save. Clicking Save submits all configuration changes from
the General, Session Cache, and Database tabs.
Add a description to a cluster node
a. Select the node.
b. Click Edit Description.
c. Enter the description for the node.
Specify an appliance to be the primary master of a cluster
a. Select the General tab.
b. To make the current node the primary master:
• If the appliance is in stand-alone mode, select Multi-node.
• If the appliance is a non-primary node in a cluster, click Make Primary Master.
View and update the current cluster general configuration
Note: You can perform the update operation only through the primary master local management
interface.
a. Select the General tab.
b. Edit the current configuration.
View and update the current cluster session cache configuration
Note: You can perform the update operation only through the primary master local management
interface.
The distributed session cache is one of the cluster services. It is used by the IBM Security Verify
Access appliance to distribute session data. You must configure the distributed session cache
settings for the cluster on the primary master.
a. Select the Session Cache tab.
b. Edit the current settings.
View and update the current runtime database configuration
The runtime database stores runtime data.
Chapter 7. System 71
Note: You can perform the update operation only through the primary master local management
interface.
a. Select the Database tab.
b. Edit the current settings.
If you change the location of the runtime database from Local to the cluster to Remote to the
cluster, Database Maintenance displays the following error message:
72 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Remove a node or a secondary master node from the cluster
This process is referred to as unregistration. The cluster configuration prohibits deleting a node
that is acting as a master.
Note: Perform this operation through the local management interface of the primary master.
a. Take one of the following actions:
• To remove a node, select the node you want to remove from Nodes on the Overview tab.
• To remove a secondary master node:
i) Delete the secondary master from Master for All Services on the General tab.
ii) Select the node you want to remove from Nodes on the Overview tab.
b. Click Delete.
c. To force the removal of the node even if the node cannot be reached, select the Force.
d. Click Yes.
Replicate settings across the cluster
You can enable the replication of the IBM Security Verify Access runtime settings and certificate
database settings. After you enable the replication option, you can no longer update runtime and
certificate database settings from the non-primary nodes.
Note: Perform this operation through the local management interface of the primary master.
a. Select the Replication tab and take one of the following actions:
• For runtime settings, click Runtime component.
• For certificate database settings, click Certificate databases.
b. Select Replicate with Cluster.
c. Click Yes.
3. Deploy the changes.
Related reference
“Cluster general configuration reference” on page 73
Use the Cluster Configuration management page to administer cluster support for the appliance.
“Session cache reference” on page 74
Use the Cluster Configuration management page to administer cluster support for the appliance.
“Runtime database” on page 80
You can view and update the current runtime database settings with the Runtime Database tab on the
Cluster Configuration management page.
Chapter 7. System 73
Primary Master
The cluster identifier of the primary master. This field is mandatory and cannot be empty.
If you are configuring the appliance as a stand-alone cluster with only a single node, you can use the
local IP address (127.0.0.1).
• If you change this value, you must save and deploy the changes before you can configure the
remaining fields.
• If you want to configure other masters, you must first join the appliances to the cluster.
• Add the entries for Primary Master, Secondary Master, Tertiary Master, and Quaternary Master in
order. For example, you cannot add a tertiary unless a secondary exists, and you cannot remove a
secondary if a tertiary exists.
• Use the Secondary Master, Tertiary Master, and Quaternary Master fields to manage the
supplementary masters. You can update these values at any time to demote existing masters or
promote new masters.
When you configure the master nodes, you must adhere to the cluster configuration rules. For more
information, see “Cluster configuration rules” on page 176.
Secondary Master
The cluster identifier of the secondary master.
Master External Reference Entity
The IP address of an external reference device that the primary and secondary masters can use to
check the health of the network.
Note: This field is required if both the Primary Master and Secondary Master fields are set.
Otherwise, it is disabled.
Tertiary Master
The cluster identifier of the tertiary master.
Note: You can set this field only if there is a Secondary Master defined.
Quaternary Master
The cluster identifier of the quaternary master.
Note: You can set this field only if there is a Tertiary Master defined.
74 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
For more information about the [session] inactive-timeout configuration entry, see the
reference topics for the Web Reverse Stanza Proxy in the Knowledge Center.
Connection idle timeout
The maximum length of time that a connection from a client can remain idle before it is closed by the
server. A value of 0 indicates that connections will not be reused. The default value is 0.
Support internal clients only
Indicates that only internal clients can use the distributed session cache.
Notes:
• If this option is selected, the remaining fields are disabled.
• Clients can be turned off. For more information about failover events, search for the Options for
handling session failover events topic in the Administering topics in the Knowledge Center. For more
information about configuration properties, see 'Advanced configuration properties' in "Advanced
Access Control Configuration topics".
Support internal and external clients
Indicates that both internal and external clients can use the distributed session cache.
Note: To share the key files across the cluster, navigate to the SSL Certificates page and select the
Replicate with Cluster check box.
Session cache supports mutual TLS. Ensure that the client’s certificate in the Distributed Session
Cache (DSC) server’s trust store and the server’s certificate in the client’s truststore are added.
The DSC by default supports internal client. It runs on port 2026 and 2027. If external clients support
is required, use a different port.
Port
The port on which external clients can communicate with the session cache. This field is mandatory if
you enable support for internal and external clients.
Enable SSL
If selected, the distributed session cache uses secure communication with its clients.
Note: If you enable SSL, you must also configure the Keyfile.
Keyfile
Lists the existing keyfiles on the appliance. These keyfiles are managed from the SSL certificates page.
You can click the SSL Certificates link on the right to go to that page.
Note: If you want to share the key files across the cluster, you must go to the SSL Certificates page
and select the Replicate with Cluster check box.
Label
Lists the certificate labels in the selected keyfile. This field is disabled if a keyfile is not selected.
Trace level
Specifies the trace level for the DSC with an integer (0 - 9). 0 indicates that trace is disabled. 9
indicates the maximum trace level.
Note: The trace level setting is not a part of the cluster policy. So this setting is not replicated across
the cluster and is not persistent across firmware updates. The trace messages are sent to the log file
for the DSC.
Configuration database
You can view and update the current configuration database settings with the Configuration Database
tab on the Cluster Configuration management page.
Note: If Oracle is set as the external configuration database and either the local management interface
or runtime server trace specification includes Oracle trace points (for example, oracle.*) the underlying
Oracle JDBC jar file is changed to a debugging jar file. This might have adverse effects on performance
and as such Oracle tracing should only be enabled for debugging purposes and disabled once complete.
Chapter 7. System 75
Warning: Enabling trace for Oracle components “oracle.*” might result in the Oracle database
administrator password being logged in clear text.
The configuration database stores configuration data, including policy information. This data is shared
with all appliances in the cluster.
Local to the cluster
Specifies the use of the internal configuration database.
Database export
Exports the current configuration data from the internal database so that it can be imported
into an external database of the chosen type. This option is useful if you want to migrate the
appliance's internal configuration database to an external database. Supported external database
types are DB2, Oracle, and PostgreSQL. The exported data are compressed into a zip file. A
readme file is included in the zip file to provide instructions on how to import the data into the
external database.
Note: For DB2 and Oracle, the configuration database schema (table and index definitions), which
is available from the File Downloads area of the appliance, must be applied to the database that
will house the configuration data before the data can be imported. For PostgreSQL, this step is not
required as the zip file also contains the database schema.
Remote to the cluster
Specifies the use of an external configuration database. Specify the following information for the
external configuration database:
Use external database for internal file sharing
Enable this option to allow the configurations to be modified on non-primary nodes of the cluster.
Note: When you enable this option, the appliance will be rebooted when the change is committed.
During the reboot, the files will be migrated between the local file system and the external
configuration database.
Type
The database type, which is one of DB2, Oracle, or PostgreSQL.
Address
The IP address or hostname of the external database server.
Port
The port on which the external database server is listening.
Username
The name of the database administrator.
Password
The password for the database administrator.
DB2
Secure
Select this check box to create a secure connection with the DB2® server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the DB2 server. The certificate must
be imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Database name
The name of the database instance on the external DB2 server.
Enable HADR and ACR
Select this checkbox to enable High Availability Disaster Recovery and Automatic Client
Reroute.
Alternate Address
The IP address or hostname of the failover database server in the HADR configuration.
76 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Alternate Port
The port on which the failover database server in the HADR configuration is listening.
Oracle
Secure
Select this check box to create a secure connection with the Oracle server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the Oracle server. The certificate must
be imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Service name
The name of the service instance on the external Oracle server.
Driver type
Specifies the type of Oracle JDBC driver that is used to connect to the Oracle server.
Available options are Thin and OCI.
PostgreSQL
Note: High availability, with an external PostgreSQL server, is achieved through the use of an
external load balancer.
Secure
Select this check box to create a secure connection with the PostgreSQL server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the PostgreSQL server. The certificate
must be imported into the lmi_trust_store and rt_profile_keys key files. Use the
SSL Certificates page to import the appropriate certificate.
Database name
The name of the database instance on the external PostgreSQL server.
Enable failover support
Select this check box to enable PostgreSQL failover support. Once this box is checked, the
failover servers management section is enabled.
Failover servers
Manage the PostgreSQL failover servers in this section.
Add
1. Click the Add button to add a new failover server. A new dialog opens.
2. Specify the new failover server address and port.
3. Click Submit to add the server.
Delete
1. Select the failover server in the grid.
2. Click the Delete button to remove the server from the list.
Move Up and Move Down
1. Select the failover server in the grid.
2. Click the Move Up or Move Down button to change the order of the server in the
list.
Chapter 7. System 77
Deploying an external configuration database
To optimize performance or increase storage capacity for the appliance, you can deploy an external
configuration database. You can configure the appliance to connect to DB2, PostgreSQL, or Oracle
database on an external server.
Procedure
1. Use the File Downloads management page in the local management interface to access the
configuration database deployment files for your environment.
Oracle script
a. Copy the downloaded cluster_config_oracle.sql file into the Oracle home directory.
For example, ORACLE_HOME=/opt/oracle/app/oracle/product/11.2.0/dbhome_1
b. Log in to SQL*Plus.
c. At the SQL prompt, run START cluster_config_oracle.sql.
DB2 script
a. Create a DB2 instance to contain the configuration database. For information about creating
the DB2 instance, see the DB2 documentation.
b. Log in to the DB2 Command utility (Windows) or DB2 host (UNIX) as the DB2 administrator.
c. Run the following command:
78 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
The following example shows the fully qualified path to the script:
Chapter 7. System 79
Database name
The name of the database instance on the external PostgreSQL server.
Oracle also requires the following information:
Secure
Select this check box to create a secure connection with the server.
Note: Before a secure connection can be established, you must first import the certificate that
the appliance uses to communicate with the server into the lmi_trust_store and also a
keystore which only contains public keys that needs to be created. Use the SSL Certificates page
to create this keystore and to import the appropriate certificate
Certificate Store
Choose the keystore which contains the certificate that will be used to communicate with the
server.
Service name
Specify the name of the Oracle instance on the external server. Contact your Oracle database
administrator for this information. SID will work but might show a warning in the LMI on saving
configuration. This can be ignored.
10. Click Save.
11. Deploy the changes.
Results
The appliance is configured to use the configuration database that is deployed on the external system.
What to do next
• Tune the external database by setting the configuration parameters. See 'Runtime database tuning
parameters' in the Runtime database section of Advanced Access Control Administration".
• On Oracle 12.2 check that the supported login protocol is set on the DBMS. If it is not, set
the value SQLNET.ALLOWED_LOGON_VERSION=11 in the sqlnet.ora file. For more information,
see https://docs.oracle.com/en/database/oracle/oracle-database/12.2/upgrd/required-tasks-
complete-upgrading-oracle-database.html#GUID-12B920E9-B2DA-48A0-832C-3E07D172A011
Runtime database
You can view and update the current runtime database settings with the Runtime Database tab on the
Cluster Configuration management page.
Note: If Oracle is set as the external runtime database and either the local management interface or
runtime server trace specification includes Oracle trace points (for example, oracle.*) the underlying
Oracle JDBC jar file is changed to a debugging jar file. This might have adverse effects on performance
and as such Oracle tracing should only be enabled for debugging purposes and disabled once complete.
Warning: Enabling trace for Oracle components “oracle.*” might result in the Oracle database
administrator password being logged in clear text.
The runtime database contains runtime data that is used by the context-based access component. You
can configure this database as an embedded database or an external database. The embedded database
is suitable for small environments only. For large-scale production environments, configure an external
database.
Note: Legacy OIDC was deprecated in IBM Security Verify Access v10.0.0. If a Verify Access installation
prior to version 10.0.0 is upgraded to version 10.0.0 or later, use the RemoveOauthDBSchema.sql to
remove the tables were used by legacy OIDC from the external HVDB. Go to System > Secure Settings >
File Downloads > Federation > Database > Common > RemoveOauthDBSchema.sql.
80 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
If Oracle is set as the external database, the user who owns the schema has to be dropped. This step is
not included in the script as it has to be executed with caution due to the possibility that the user can own
other schemas as well.
Local to the cluster
Specifies the use of the internal runtime database.
Note: Only the Maximum Size field relates to the internal runtime database. If you use the internal
runtime database, all other fields are disabled.
Maximum Size (% of available disk)
The size of the internal runtime database. If you select the Local to the cluster option, this field
is mandatory. The maximum size is a percentage of the remaining disk space at the time that the
policy is applied.
The valid value range is from 10% to 80%. If a change in this value results in a calculated maximum
size, which is smaller that the current size of the database, the database must be re-created. In
this case, all existing data from the database is lost.
To determine the percentage of available disk space to assign to the internal database, consider
the following aspects of your environment:
• The current disk usage on the appliance. You can view the Disk Usage on the Appliance
Dashboard in the LMI.
• Internal disk requirements for other utilities such as logging and snapshots.
Database export
Exports the current runtime data from the internal database so that it can be imported into an
external database of the chosen type. This option is useful if you want to migrate the appliance's
internal runtime database to an external database. Supported external database types are DB2,
Oracle, and PostgreSQL. The exported data are compressed into a zip file. A readme file is
included in the zip file to provide instructions on how to import the data into the external
database.
Remote to the cluster
Specifies the use of an external runtime database. Specify the following information for the external
runtime database:
Type
The database type, which is either DB2, Oracle, or, PostgreSQL.
Address
The IP address or hostname of the external database server.
Port
The port on which the external database server is listening.
Username
The name of the database administrator.
Password
The password for the database administrator.
DB2
Secure
Select this check box to create a secure connection with the DB2 server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the DB2 server. The certificate must
be imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Database name
The name of the database instance on the external DB2 server.
Chapter 7. System 81
Enable High Available Disaster Recovery and Automatic Client Reroute
Select this checkbox to enable HADR and ACR.
Alternate Address
The IP address or hostname of the failover database server in the HADR configuration.
Alternate Port
The port on which the failover database server in the HADR configuration is listening.
Oracle
Secure
Select this check box to create a secure connection with the Oracle server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the Oracle server. The certificate must
be imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Service name
The name of the service instance on the external Oracle server.
Driver type
Specifies the type of Oracle JDBC driver that is used to connect to the Oracle server.
Available options are Thin and OCI.
PostgreSQL
Secure
Select this check box to create a secure connection with the PostgreSQL server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the PostgreSQL server. The certificate
must be imported into the lmi_trust_store and rt_profile_keys key files. Use the
SSL Certificates page to import the appropriate certificate.
Database name
The name of the database instance on the external PostgreSQL server.
Enable failover support
Select this check box to enable PostgreSQL failover support. Once this box is checked, the
failover servers management section is enabled.
Failover servers
Manage the PostgreSQL failover servers in this section.
Add
1. Click the Add button to add a new failover server. A new dialog opens.
2. Specify the new failover server address and port.
3. Click Submit to add the server.
Delete
1. Select the failover server in the grid.
2. Click the Delete button to remove the server from the list.
Move Up and Move Down
1. Select the failover server in the grid.
2. Click the Move Up or Move Down button to change the order of the server in the
list.
82 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Deploying an external runtime database
To optimize performance or increase storage capacity for the appliance, you can deploy an external
runtime database. You can configure the appliance to connect to DB2, PostgreSQL, or Oracle database on
an external server.
Procedure
1. Use the File Downloads management page in the local management interface to access the runtime
database deployment files for your environment.
Oracle script
a. Copy the downloaded isam_access_control_oracle.sql file into the Oracle home
directory. For example, ORACLE_HOME=/opt/oracle/app/oracle/product/11.2.0/
dbhome_1
b. Log in to SQL*Plus.
c. At the SQL prompt, run START isam_access_control_oracle.sql.
DB2 script
a. Create a DB2 instance to contain the runtime database. For information about creating the
DB2 instance, see the DB2 documentation.
Chapter 7. System 83
b. Open the isam_access_control_db2.sql file in an editor on the DB2 server.
c. Replace the following macros with the values specific to your environment:
&DBINSTANCE
The name of the DB2 instance.
&DBUSER
The name of the DB2 administrator.
&DBPASSWORD
The password for the DB2 administrator.
d. Save the changes.
e. Log in to the DB2 Command utility (Windows) or DB2 host (UNIX) as the DB2 administrator.
f. Run the following command:
The following example shows the fully qualified path to the script:
84 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
b. In the CREATE DATABASE entry, get the name that is specified. In the following entry, HVDB is
the string that identifies the default database name:
Results
The appliance is configured to use the runtime database that is deployed on the external system.
General Information
HVDB data is language agnostic. Character support might not be an issue with regards to the installation
that is chosen.
Oracle DB_BLOCK_SIZE or PAGE_SIZE can vary based on deployments but it is suggested to have at
least 16384.
The suggested character set is ALUTF8.
User permissions for database must have read-write access and the ability to execute the commands in
the SQL script.
Oracle:
Chapter 7. System 85
DB2:
What to do next
• Tune the external database by setting the configuration parameters. See 'Runtime database tuning
parameters' in the Runtime database section of "Advanced Access Control Administration" .
• On Oracle 12.2 check that the supported login protocol is set on the DBMS. If it is not, set
the value SQLNET.ALLOWED_LOGON_VERSION=11 in the sqlnet.ora file. For more information,
see https://docs.oracle.com/en/database/oracle/oracle-database/12.2/upgrd/required-tasks-
complete-upgrading-oracle-database.html#GUID-12B920E9-B2DA-48A0-832C-3E07D172A011
Procedure
1. From the top menu, select System > Network Settings > DCS Configuration.
2. Specify the general settings.
Worker Threads
The number of worker threads that are allocated to processing requests.
Maximum Session Lifetime
The maximum lifetime (in seconds) of any session that is stored by the DSC.
Client Grace Period
The length of time (in seconds) that a client (aka Web Reverse Proxy) has to reconnect before
sessions that are owned by that client are discarded.
Connection idle timeout
The maximum length of time that a connection from a client can remain idle before it is closed by
the server. A value of 0 indicates that connections will not be reused. The default value is 0.
Service Port
The port number on which the DSC will listen for requests.
Replication Port
The port number on which the DSC will listen for requests from replicated DSC servers.
3. Specify the external connection settings. This data is used when configuring the DSC clients (aka Web
Reverse Proxy and administration client). It corresponds to the host identifier and port used to connect
to the replication and session services of the various DSC servers. For failover purposes, up to 4 DSC
servers can be configured (primary, secondary, tertiary, and quaternary).
Address
The IP address or resolvable host name over which clients can connect to the DSC.
Service Port
The port that can be used by clients to connect to the DSC for session requests. This port can be
different to the configured Service Port under general settings due to the port mapping capability
of Docker.
86 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Replication Port
The port that a DSC server should use when connecting to a replicated DSC server. This port can
be different to the configured Replication Port under general settings due to the port mapping
capability of Docker.
4. Click Save.
Procedure
1. From the top menu, select System > Network Settings > Database Configuration.
2. Specify the following information for the runtime database.
Type
The database type, which is either DB2, Oracle, or, PostgreSQL.
Address
The IP address or hostname of the external database server.
Port
The port on which the external database server is listening.
Username
The name of the database administrator.
Password
The password for the database administrator.
The following fields are specific to each type of database.
DB2
Secure
Select this check box to create a secure connection with the DB2 server.
Note: Before a secure connection can be established, you must first import the certificate for
the appliance to use for communication with the DB2 server. The certificate must be imported
into the lmi_trust_store and rt_profile_keys key files. Use the SSL Certificates page
to import the appropriate certificate.
Database name
The name of the database instance on the external DB2 server.
Enable High Available Disaster Recovery and Automatic Client Reroute
Select this checkbox to enable HADR and ACR.
Alternate Address
The IP address or hostname of the failover database server in the HADR configuration.
Alternate Port
The port on which the failover database server in the HADR configuration is listening.
Oracle
Secure
Select this check box to create a secure connection with the Oracle server.
Chapter 7. System 87
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the Oracle server. The certificate must
be imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Service name
The name of the service instance on the external Oracle server.
Driver type
Specifies the type of Oracle JDBC driver that is used to connect to the Oracle server. Available
options are Thin and OCI.
PostgreSQL
Note: High availability, with an external PostgreSQL server, is achieved through the use of an
external load balancer.
Secure
Select this check box to create a secure connection with the PostgreSQL server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the PostgreSQL server. The certificate must
be imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Database name
The name of the database instance on the external PostgreSQL server.
3. Click Save.
System settings
Information about managing system settings on your appliance.
Procedure
1. Click System > System Settings > Date/Time
2. Configure the following options:
Option Description
Time Zone Specifies the time zone for the appliance.
Date/Time Specifies the day, month, year, and time for the
appliance.
NTP Server address Lists the NTP (NIST Internet Time Service)
servers the appliance uses. You can enter
multiple NTP servers, separated by commas.
3. Click Save.
88 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
An access log of requests to the management interface can be enabled by setting the LMI Access Log
Format parameter. The format of this string should conform to the HTTP access log format for IBM Liberty
application server. More details about log format options can be found in the Liberty documentation.
Procedure
1. Click System > System Settings > Administrator Settings.
The available tuning parameters are listed in a table.
2. Modify the parameters.
• To edit a parameter, select the parameter from the table and click Edit. In the edit window, change
the parameter value.
Note: If you edit the SSHD port parameter in a clustered environment, all machines in the cluster
must be configured with the same SSHD port. As the configured port will not be automatically
distributed across all machines in the cluster, each machine must be updated individually.
• To delete the current settings for a parameter and change its value to unset, select the parameter
from the table and click Delete.
Note: The administrator password cannot be reset.
3. Deploy the changes.
Procedure
1. Select System > System Settings > Administrator Settings.
2. Click LMI Tracing.
The LMI tracing components and trace levels are displayed.
Chapter 7. System 89
Table 10. LMI tracing components (continued)
Component Description
com.ibm.isam.wga.* This option enables tracing for the components of the
Security Verify Access Base offering. For example, the
management of reverse proxy instances.
com.ibm.isam.mga.* This option enables tracing for the components of the
Security Verify Access Advanced Access Control and
Federation offerings. For example, the risk based analysis
(RBA) configuration, the management of federations,
partners, and module chains.
com.ibm.mesa.* This option enables tracing for the underlying
components that compose the LMI framework. These
components are used both as a base for all of the
offerings and to provide the management of most system
settings. For example, updates and network configuration.
HTTP This option enables tracing for the components of
the web application server that are involved in HTTP
communication.
SSL This option enables tracing for the components of
the web application server that are involved in SSL
communication.
JSP This option enables tracing for the JavaServer pages
components of the web application server.
Servlet Engine This option enables tracing for the servlet engine and web
container components of the web application server.
Session Management This option enables tracing for the components of the
web application server that make up the session and
session management functionality.
Configuration This option enables tracing for the configuration of the
web application server.
Native Security This option enables tracing for the native security
components of the web application server.
90 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Table 11. LMI trace levels (continued)
Level Description
info General information that outlines the overall task
progress.
audit Significant event that affects the server state or
resources.
warning Potential error or impending error. This level can
also indicate a progressive failure, for example,
the potential leaking of resources.
severe Task cannot continue. But component,
application, and server can still function.
This level can also indicate an impending
unrecoverable error.
fatal Task cannot continue. Component, application,
and server cannot function.
off Logging is turned off.
3. Define the trace specifications in either of the following methods.
• Select a component and trace level from the table, and then click the Add. Repeat this procedure
until all trace specifications are added.
• Manually enter the trace specifications in the Trace Specification text area.
4. Click Save.
5. Deploy the changes.
Note: The local management interface is automatically restarted so that the changes can take effect.
Procedure
1. From the top menu, select System > System Settings > Management Authentication.
All current management authentication settings are displayed.
2. In the Main tab:
• Select Local User Database if you want to use the local user database for authentication.
• Select Remote LDAP User Registry if you want to use the remote LDAP user registry for
authentication.
Note: If a remote user registry is configured for management authentication, the local administrator
user (admin) can continue to be referenced with the "admin@local" user name. You can use this as
a fail safe in the event that the remote user registry is not reachable.
a. In the LDAP tab:
i) Specify the name of the LDAP server in the Host name field.
ii) Specify the port over which to communicate with the LDAP server in the Port field.
iii) Select the Anonymous Bind check box if the LDAP user registry supports anonymous bind.
iv) Specify the DN of the user that is used to bind to the registry in the Bind DN field.
v) Specify the password that is associated with the bind DN in the Bind Password field.
Chapter 7. System 91
vi) Optional: If you want to enable LDAP client debugging for authentication related issues,
select the Debug check box. The LDAP debugging log can be viewed by going to Monitor >
Application Log Files and accessing the management_ui > ldap_debug.log file.
b. In the LDAP General tab:
i) Specify the name of the LDAP attribute that holds the supplied authentication user name of
the user in the User Attribute field.
ii) Specify the name of the LDAP attribute that is used to hold the members of a group in the
Group Member Attribute field.
iii) Specify the base DN that is used to house all administrative users in the Base DN field.
iv) Specify the DN of the group to which all administrative users belong in the Administrative
Group DN field.
Note: All administrative users must have permission to view the specified admin_group_dn
group within the user registry.
c. In the LDAP SSL tab:
i) Select the Enable SSL check box to define whether SSL is used when the system
communicates with the LDAP server.
ii) Select the name of the key database file in the Key File Name field.
iii) Select the name of the certificate to be used if client authentication is requested by the LDAP
server in the Certificate Label field.
d. In the User Mapping tab:
i) Select the Enable checkbox to enable the mapping of a client certificate DN to a new format
prior to the user being authenticated.
ii) The User mapping script field contains a placeholder script that will be set as the default
unless a new script is entered. The script contains a Javascript function that takes a Map as an
input and returns a String that represents the new DN. The map contains the following values
that can be used in the mapping:
– cert > The actual X509Certificate object.
– principal > The X500Principal in the certificate.
– san > The certificate subject alternative names.
– dn > The certificate DN.
– baseDN > The management authentication configuration value for base DN.
– userAttribute > The management authentication configuration value for user attribute.
– groupMemberAttribute > The management authentication configuration value for group
member attribute.
– Each distinct rdns from the DN separately. For example the DN of
cn=testuser,o=test,c=us would result in 3 entries in the map:
- cn > testuser
- o > test
- c > us
The default script will use the cn from the map and combine it with the userAttribute and
baseDN to create the new DN:
function mapUser(props) {
var user = props.get(“cn”);
return props.get(“userAttribute”) + “=“ + user + “,” + props.get(“baseDN”);
}
92 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
ii) Specify the name of the user attribute that contains SSH public key data in the Public Key
Attribute field.
The public key attribute is an attribute that contains text data in the format of an SSH
AuthorizedKeysFile file.
3. Click Save to save your settings.
Note: For the changes to take effect, they must be deployed.
4. Optional: Click Test to test the authentication.
Note: If there have been changes made to the management authentication configuration that have not
yet been deployed, this test will run using the undeployed configuration.
a. In the Test Authentication window, enter the user name in the Username field.
b. Enter the password in the Password field.
c. Click Test.
If the authentication is successful, a success message is displayed. If the authentication is not
successful, an error message is displayed.
Chapter 7. System 93
the features on a particular page of the local management interface. For example, to access all of the
functions on the Management Authorization page, the user needs permissions for the following features:
• Account Management
• Management Authorization
If a user clicks a link or attempts to complete an action for which they do not have the appropriate
permission, an error message is returned. The error message includes the details about which permission
is required for the selected action.
When you search for remote LDAP users or groups, consider the following points:
• Users are assumed to be contained in the Base DN and are identified based on the User Attribute that
is set on the Management Authentication page.
• Groups are also assumed to be contained in the Base DN that is defined on the Management
Authentication page.
• Groups are identified based on cn.
• Groups must be among the following types: group, groupofUniqueName, or groupOfNames.
Authorization enforcement applies to the local management interface, web services, and client certificate
authentication.
Authorization enforcement in the local management interface
When a user logs in the local management interface, the menu displays only the pages that the user
has access to. When users attempt to go to a page to which they do not have access, a page is
displayed that explains that the user does not have authorization to view the page. When a user views
a page with read-only permission, users cannot modify the configuration or change the state of any
services on the page. If a user attempts to do so, a message is displayed stating that the user does not
have permission to perform the requested action.
Authorization enforcement in web services
If a user has read-permission for a feature, they can perform GET requests against the associated Web
services. If a user has write-permissions on a feature, they can issue any of the associated GET, POST,
PUT, and DELETE web services. When a user attempts to issue a web service request that they are
not authorized to perform, they receive a response with the HTTP status code 403 Forbidden and a
message that states that they are not authorized to complete the transaction.
Authorization enforcement in client certificate authentication
If you want to use client certificates to authenticate to the local management interface, ensure that
the authorization framework can map the DN of the presented client certificate to a user that exists in
the registry that is used for authentication.
For example, a certificate is presented with DN: cn=testUser,ou=qa,o=ibm,c=au.
When you use a remote LDAP user registry for authentication, the authorization decision is made for a
user that matches the entire DN in the user registry.
For example, a user that matches cn=testUser,ou=qa,o=ibm,c=au is searched for in the remote
LDAP user registry, and the policy that is associated with that user is enforced.
When you use the local user database, the authorization decision is made for a user that matches the
CN of the presented DN. For example, the user that is called testUser is searched for in the local user
database, and the policy that is associated with that user is enforced.
Authorization enforcement in the Command Line Interface
Access to the command line interface from the console or SSH can be restricted by using the ‘CLI and
CLI Web Service’ feature. Only those users who have 'write’ access to this feature will be permitted to
access the command line interface.
A user can be assigned multiple roles. In this case, the user receives the highest cumulative permission
from these roles for each feature. For example, if they are assigned two roles and one role has read-
permission for a feature but the second role has write-permission for the feature, the user is granted
write-permission.
94 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Note: The appliance caches authentication details to reduce load on the user registry. The authentication
details might be used for up to 10 minutes after they are changed. This behavior can be changed by using
an advanced tuning parameter. Add the advanced tuning parameter lmi.authCache.baenabled with a
value of false to disable this caching. See “Managing advanced tuning parameters” on page 97.
A performance penalty is incurred when you use this parameter. The user registry is queried when:
• A user logs in the local management interface through the browser.
• A request to the web services API by using Basic Authentication is received.
There is some degradation of performance in environments that make heavy use of the web services API
by using Basic Authentication.
Full Read and Full Write roles
The Full Read and Full Write roles do not use a permissions list when determining authorization.
Instead administrators who are members of the Full Read role are permitted to perform HTTP GET
requests to all Local Management Interface URLs. Similarly users who are members of the Full Write
role are permitted to perform HTTP GET, POST, PUT and DELETE requests to all Local Management
Interface URLs.
Procedure
1. Select System > System Settings > Management Authorization.
2. Under Roles, select the Enable Authorization Roles check box.
3. Follow the prompts to complete the action you want to take.
Tip: Use the quick filter to retrieve group names, user names, and features.
Adding a role
a. In the Roles panel on the left, click New.
b. In the Create New Role window, enter a name for the new role.
c. Click OK.
Removing a role
a. In the Roles panel on the left, select the role to delete.
b. Click Delete.
c. In the Removing Role window, verify that the role name to delete is correct and then click Yes.
Assigning a role to local groups or users
a. In the Roles panel on the left, select the role to edit membership for.
b. In the Role Membership panel on the right, select the Local User Database tab if it is not
already selected.
c. Click Edit above the group name table or the user name table.
d. In the Edit Local Members window, select or clear the check box on the Groups and Users tabs
as needed.
e. Click OK.
Assigning a role to LDAP groups or users
a. In the Roles panel on the left, select the role to edit membership for.
b. In the Role Membership panel on the right, select the Remote LDAP User Registry tab if it is
not already selected.
c. In the Edit Remote LDAP Members window, modify LDAP groups and users on the Groups and
Users tabs as needed.
• To add an LDAP group or user, enter the details in the text field and then click Add.
• To remove an LDAP group or user, select the entry and then click Delete.
Chapter 7. System 95
d. Click OK.
Editing permissions for a role
a. In the Roles panel on the left, select the role to edit permissions for.
b. In the Features panel on the right, select the permission that you want from the drop-down list
in each row.
If you upgrade from a previous version of the appliance, new role membership features are set
to None by default. Configure the permissions, if necessary.
Note: The displayed features reflect the features that are available in the activated offerings.
If you deactivate a product, the features that are specific to that product are removed from
any existing roles. If you reactivate the product in the future, these features and the associated
permissions are added to the roles again. Any permissions from a prior activation are re-
instantiated. If it is the first time that the product is activated, the product-specific features are
added to each role with no assigned permissions.
c. Click Save to save the permission settings.
96 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
– The first and last character of the password cannot be a space character. Any leading or trailing
spaces in the password are removed.
– If the user is logged in, you
- Can also click Set Password in the top banner.
- Must enter the existing password before you can change it.
– If you change the password while logged in as the admin user, the password update is automatically
deployed without the need for a manual deployment step.
• Create or delete a group.
• Add a user to or remove a user from a group.
– You can do this step either from the Users or Groups page.
– The links in the title bars switch between Users and Groups.
• Add or change role membership. See “Managing roles of users and groups” on page 93.
Note: The authentication cache that stores the credentials for configured users refreshes every 10
minutes by default. If you just changed a user password or deleted a user, the change might not be
effective immediately. It is possible for the user to continue performing web service calls with their
original credentials until the authentication cache is refreshed.
Procedure
1. From the top menu, select System > System Settings > Account Management.
2. Select the User or Group link.
3. Follow the prompts to complete the action you want to take.
Chapter 7. System 97
Table 12. Advanced tuning parameters (continued)
Parameter Value Description
gw_net.tuning.downdelay The default value Specifies the time, in milliseconds, to wait
is 0. before disabling a slave after a link failure is
detected.
The gw_net.tuning.downdelay value
must be a multiple of the
gw_net.tuning.miimon value; if not, it is
rounded down to the nearest multiple.
If your switches take a long time to go into
backup mode, it might not be desirable to
activate a backup interface immediately after
a link goes down. It is possible to delay
the moment at which a link is disabled by
passing the module parameter downdelay.
gw_net.tuning.miimon The default value Specifies the MII link monitoring frequency
is 100. in milliseconds.
High availability is achieved by using MII
status reporting. The bonding driver can
regularly check all its slaves links by
checking the MII status registers. This
parameter determines how often the link
state of each slave is inspected for link
failures.
A value of 0 disables MII link monitoring. A
value of 100 is typically a suitable value. It
means that a dead link will be detected 100
milliseconds at most after it goes down. The
value must not come to close to 1000/HZ
(10 ms on i386) because such setting might
reduce the system interactivity.
98 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Table 12. Advanced tuning parameters (continued)
Parameter Value Description
gw_net.tuning.updelay The default value Specifies the time, in milliseconds, to wait
is 0. before enabling a slave after a link recovery
is detected.
The gw_net.tuning.updelay value
must be a multiple of the
gw_net.tuning.miimon value; if not, it is
rounded down to the nearest multiple.
When a switch restarts, it is possible that
its ports report "link up" status before
they become usable. This behavior might
cause a bond device to use some ports
that are not ready yet. It is possible to
delay the moment at which an active
link is reused by passing the module
parameter gw_net.tuning.updelay (in
milliseconds, must be a multiple of
gw_net.tuning.miimon).
A similar situation can occur when a host
renegotiates a lost link with the switch (in
case of cable replacement).
A special case is when a bonding interface
loses all slave links. Then, the driver
immediately reuses the first link that
goes up, even if gw_net.tuning.updelay
parameter was specified. If there are slave
interfaces in the gw_net.tuning.updelay
state, the interface that first went
into that state is immediately reused.
This setting reduces downtime if the
value of gw_net.tuning.updelay was
overestimated.
Chapter 7. System 99
Table 12. Advanced tuning parameters (continued)
Parameter Value Description
gw_net.tuning.use_carrier 0, 1(default) Specifies whether gw_net.tuning.miimon
uses MII / ETHTOOL ioctls, or
netif_carrier_ok() to determine the link
status. The MII / ETHTOOL ioctls are
less efficient and use a deprecated
calling sequence within the kernel. The
netif_carrier_ok() relies on the device driver
to maintain its state with netif_carrier_on/off.
Most, but not all, device drivers support this
facility.
If bonding insists that the link is up when
it cannot be, the cause might be that your
network device driver does not support
netif_carrier_on/off. The default state for
netif_carrier is "carrier on". So if a driver
does not support netif_carrier, it appears
as if the link is always up. In this case,
setting gw_net.tuning.use_carrier to
0 causes bonding to revert to the MII /
ETHTOOL ioctls method to determine the link
state.
A value of 1 enables the use of
netif_carrier_ok(). A value of 0 specifies to
use the deprecated MII / ETHTOOL ioctls.
The default value is 1.
100 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Table 12. Advanced tuning parameters (continued)
Parameter Value Description
gw_net.tuning.xmit_hash_poli layer2 Selects the transmit hash policy to use for
cy (default), slave selection in balance-xor, 802.3ad, and
layer2+3, tlb modes. Here are the possible values:
layer2
Uses XOR of hardware MAC addresses
and packet type ID field to generate the
hash. The formula is as follows:
• hash = source MAC XOR destination
MAC XOR packet type ID
• slave number = hash modulo slave
count
This algorithm places all traffic to a
particular network peer on the same
slave.
This algorithm is 802.3ad compliant.
layer2+3
This policy uses a combination of
layer2 and layer3 protocol information
to generate the hash. It uses XOR
of hardware MAC addresses and IP
addresses to generate the hash. The
formula is as follows:
• hash = source MAC XOR destination
MAC XOR packet type ID
• hash = hash XOR source IP XOR
destination IP
• hash = hash XOR (hash RSHIFT 16)
• hash = hash XOR (hash RSHIFT 8)
• hash = hash Modulo
(bonding_slave_count)
If the protocol is IPv6, then the source
and destination addresses are first
hashed by using ipv6_addr_hash.
This algorithm places all traffic to a
particular network peer on the same
slave. For non-IP traffic, the formula is
the same as for the layer2 transmit hash
policy.
This policy is intended to provide a
more balanced distribution of traffic than
layer2 alone, especially in environments
where a layer3 gateway device is
required to reach most destinations.
This algorithm is 802.3ad compliant.
Managing snapshots
Use snapshots to restore prior configuration and policy settings to the appliance. Back up the appliance
on a frequent basis by downloading snapshot files.
102 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Note: The snapshot files do not contain the internal user registry data. Use standard LDAP back-up
tools, using port 636 on the appliance, to back-up and restore the data associated with the internal user
registry.
Procedure
1. Click System > System Settings > Snapshots.
2. In the Snapshots pane, use one or more of the following commands:
Option Description
New To create a snapshot, click New, type a comment that describes the snapshot, and then
click Save.
Edit To edit the comment for a snapshot, select the snapshot, click Edit, type a new
comment, and then click Save.
Delete To delete snapshots, select one or more snapshots, and then click Delete.
Apply To apply a snapshot, select the snapshot, and then click Apply.
Note: The password of the 'admin' user is not contained in a snapshot. Therefore the
password of the 'admin' user will remain unchanged after the application of a snapshot.
Download To download a snapshot, select the snapshot, click Download, browse to the drive where
you want to save the snapshot, and then click Save.
Note: If you download multiple snapshots, the snapshots are compressed into a .zip file.
Upload To upload snapshots, click Upload, browse to the snapshots you want to upload and
select the snapshots. Wait for the Comment field of the Upload Snapshot window
to be populated automatically. When the Comment field is populated, click Save
Configuration.
Note: You can upload only one snapshot at a time.
Procedure
1. Click System > System Settings > Support Files.
2. In the Support Files pane, use one or more of the following commands:
Option Description
New To create a support file, click New, select the categories and instances to include in the
support file, optionally enter a comment that describes the support file, and then click
Save Configuration. A new support file is created on the appliance.
Procedure
1. Click System > System Settings > System Alerts.
2. In the System Alerts pane, complete one or more of the following tasks:
• To receive notifications for problems with the system, select one or more system alert objects from
the Available Objects pane, and add them.
• To create or edit alert objects, see these related topics to configure one or more of the following
alert objects:
– “Configuring email alert objects” on page 105
– “Configuring remote syslog alert objects” on page 106
– “Configuring SNMP alert objects” on page 104
• To delete a system alert, select the alert and then click Delete.
Procedure
1. Click System > System Settings > System Alerts.
2. In the System Alerts page, take one of the following actions:
• Click New > SNMP.
• Select an existing object, and then click Edit.
3. Type a name for the alert object.
4. Select a trap version from the list.
5. In the SNMP Manager box, type the IP address, host name, or fully qualified domain name (FQDN) of
the SNMP manager.
Note: The SNMP host must be accessible to the appliance to send SNMP traps.
6. Type the port number that the SNMP manager monitors for notifications.
Note: The default port number is 162.
7. Type a comment to describe the SNMP alert object.
104 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
8. For trap versions V1 or V2c, type the name of the community that is used to authenticate with the
SNMP agent.
9. For trap version 3, configure the following options:
Option Description
Name Type the user name to be authenticated in the SNMP database.
Notification Type On the Notification Type tab, select Inform or Trap in the SNMP Trap Version
field.
Authentication On the Authentication and Privacy tab, select Enabled to enable
authentication, type the authentication passphrase, and then select an
authentication type.
Privacy Select Enabled to enable privacy, type the privacy passphrase, and then select a
privacy type.
10. Click Save.
Procedure
1. Click System > System Settings > System Alerts.
2. In System Alerts page, take one of the following actions:
• Click New > Email.
• Select an existing object, and then click Edit.
3. Configure the following options:
Option Description
Name Specifies a meaningful name for the response.
Note: This name displays when you select
responses for events, so give the response a
name that allows users to easily identify what
they are selecting.
Procedure
1. Click System > System Settings > System Alerts.
2. In the System Alerts page, do one of the following steps:
• Click New > Remote Syslog.
• Select an existing remote syslog alert object, and then click Edit.
3. Configure the following options:
Option Description
Name Specifies a meaningful name for the response.
Remote Syslog Collector Specifies the fully qualified domain name or IP
address of the host on which you want to save the
log.
Note: The host must be accessible to the
appliance.
Remote Syslog Collector Port Specifies the custom port that is used to connect
to the syslog collector. The default is 514.
Comment Type a comment to identify the remote syslog
alert object.
4. Click Save.
Object Types
<object type> corresponds to the type of System Alert object. A list of the mechanisms and their
types follows:
Mechanism <type>
Event log logdb
SNMP snmp
Email email
Remote Syslog syslog
Note: Event Log refers to the default mechanism, which is used to populate the System Events that
is seen on the Event Log page in the Local Management Interface and the System Events Log REST
APIs.
106 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Object Instances
<object instance> refers to the UUID of a specific alert object instance. This can be used to mute
events for just a particular System Alert object instance rather than for all objects of a given type.
The <object instance> can be discovered by using the REST APIs. Refer to Manage: System
Settings > System Settings > System Alerts > Event Log within the Web Services documentation.
Patterns
<patterns> are a list of space separated event IDs or patterns which should be ignored.
Each pattern can be either one of the following:
1. A literal event ID. For example, GLGPL1002I
2. A regular expression pattern. For example, (.*)I or GLG(.*)
Examples
To mute the events GLGSY0102I and GLGPL1001I on an SNMP alert object with the UUID
2a6cc325-2d98-4747-85f0-8d7bcac4daec:
To mute all informational events (events which end with an I character) and GLGAU0003W (user failed to
login) on all SNMP alert objects:
To mute all events related to snapshots (events which begin with GLGSS) on the System Event Log:
For more information on Event IDs and their meaning, see Appliance Messages and Events that are
generated by the events framework.
Procedure
1. Click System > System Settings > Restart or Shut down
2. Perform one of the following tasks:
Option Description
Click Restart to restart the Restarting the appliance takes it offline for several minutes.
appliance
Procedure
1. From the top menu, select System > System Settings > Application Locale.
2. Select the language that you want the application log files to be written in.
3. Click Save.
108 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• UCD-SNMP-MIB
• IP-FORWARD-MIB
• NET-SNMP-AGENT-MIB
• NET-SNMP-VACM-MIB
Procedure
1. From the top menu, select Manage System Settings > System Settings > SNMP Monitoring.
2. Type the port number that the SNMP agent must listen on in the Port field.
Note: The default port number is 161.
3. Select the SNMP Protocol that the agent must use.
• SNMPv1/SNMPv2c
Type the name of the community that the SNMP uses to authenticate with the SNMP agent.
• SNMPv3
Configure the following options to describe the user who accesses the SNMP agent.
Security Level
Select the security level of the user.
User Name
Type the name of the user who accesses the SNMP agent.
Auth Protocol
Select the authentication protocol to use.
Auth Password
Type the password to use for authentication.
Confirm Auth Password
Type the password to use for authentication.
Priv Protocol
Select the privacy protocol to use.
Priv Password
Type the password to be used as a privacy passphrase.
Confirm Priv Password
Type the password to be used as a privacy passphrase.
4. Click Save.
For IBM Security Verify Access environments established on earlier versions, password quality checking is
not performed unless the password.policy tuning parameter is added manually.
Supported options
The following options from the pam_pw quality module can be used when authoring a password policy:
• minlen
• dcredit
• ucredit
• lcredit
• ocredit
• minclass
• maxrepeat
• maxclassrepeat
Note: Dictionary-based checking is not supported.
Procedure
1. From the top menu, select Manage System Settings > System Settings > Auxiliary Configuration
Files.
The displayed directories contain the configuration files which are available.
Note: On initial install there might be no auxiliary configuration files listed. The files are automatically
created and added to the auxiliary configuration files section as they are required.
2. Click Refresh to get the most up-to-date data.
3. Select the required file.
4. Click Download to save the file to your local drive.
5. Confirm the save operation in the browser window that pops up.
110 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Secure settings
Information about managing secure settings on your appliance.
Procedure
1. Log in to the local management interface.
2. Select System > Secure Settings > SSL Certificates.
3. Import the LDAP server certificate into the trust store of the runtime profile.
For example: rt_profile_keys.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. You can view all current certificate database names and their last modified time information.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database that you want to describe.
Procedure
1. From the menu, select System > Secure Settings > SSL Certificates.
2. From the menu bar, click New.
3. On the Create SSL Certificate Database page, enter the name of the certificate database that you
want to create. The name of the certificate database name must be unique.
4. Select the type of the certificate database.
• If you select Local as the type, you can go to Step 5.
• If you select Network as the type, complete the following fields:
a. On the Main tab, complete the Token Label and Passcode fields.
b. Select the HSM type.
– If you select nCipher nShield Connect as the HSM type, complete the following fields:
i) On the HSM tab, the HSM IP Address field for the primary HSM device is required. The
rest of the fields are optional. You can also provide details of a secondary HSM device. The
secondary device can be used for load balancing and failover.
ii) On the RFS tab, if you select Automatic, enter the address of the remote file system that
stores the key files. The rest of the fields are optional. If you select Manual Upload, click
Browse to select the .zip file that contains the needed key files. The contents of the .zip file
are extracted and stored on the local file system.
Note:
- The nCipher nShield Connect integration is only available if you first install
the 'IBM Security Verify Access nCipher nShield Connect HSM Extension'. This
extension is available for download from the IBM Security App Exchange (https://
exchange.xforce.ibmcloud.com/hub/IdentityandAccess).
- If the files in the remote file system are changed and you selected the Manual Upload
option, you must manually upload an updated .zip file. The updated .zip file overwrites
existing file entries but does not delete "missing" file entries.
– If you select SafeNet Luna SA as the HSM type, complete the IP Address and Admin
Password fields on the SafeNet tab.
Note: The SafeNet integration is only available if you first install the 'IBM Security Verify Access
SafeNet Luna Network HSM Extension'. This extension is available for download from the IBM
Security App Exchange (https://exchange.xforce.ibmcloud.com/hub/IdentityandAccess). You
can then use the appliance to manage the certificates that are contained on the HSM device.
However, some operations, such as certificate extract, are not supported.
– If you select SafeNet Luna High Availability as the HSM type, compete the SafeNet Keystore
List, Recovery Mode, Retry Count and HA Log Size fields on the SafeNet High Availability tab.
Note: SafeNet High Availability is only available if you first install the 'IBM Security
Verify Access SafeNet Luna Network HSM Extension'. This extension is available for
download from the IBM Security App Exchange (https://exchange.xforce.ibmcloud.com/hub/
112 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
IdentityandAccess). You must configure one or more SafeNet devices before a High Availability
group can be configured.
5. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 39.
Note: Changes to HSM keystores do not trigger restarts of Verify Access components like changes to
local databases do. If an HSM keystore is modified, then any components that are using the modified
keystore must manually be restarted or reloaded for the changes to take effect.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database that you want to rename.
3. Select Manage > Rename
4. In the Rename SSL Certificates Database window, enter the new name of the certificate database. The
new name of the certificate database name must be unique.
5. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 39.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select Manage > Import.
3. Click Browse under Certificate Database File.
4. Browse to the directory that contains the file to be imported and select the file. Click Open.
5. Click Browse under Stash File.
6. Browse to the directory that contains the file to be imported and select the file. Click Open.
7. Click Import.
A message that indicates successful import is displayed.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 39.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database that you want to export.
3. Select Manage > Export.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database that you want to delete.
3. Select Delete
4. In the window that pops up, click Yes.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 39.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Click Replicate with Cluster to have the certificate databases automatically replicated across the
cluster.
Note: This option is available only if the current appliance is the primary master of a cluster. If
this option is selected, you cannot modify the certificate databases on any appliance other than the
primary master.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database of interest.
3. Select Manage > Edit SSL Certificate Database.
4. All signer certificate names are displayed on the Signer Certificates tab.
Import a signer certificate
a. Click Manage > Import.
b. Click Browse. Then, select the signer certificate to be imported.
c. In the Certificate Label field, enter what you want to label the signer certificate.
d. Click Import.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 39.
114 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
View and export a signer certificate
a. Select the signer certificate that you want to view.
b. Click Manage > View. The content of the signer certificate is displayed in the browser.
c. Optional: Click Export. Then, confirm the save operation in the window that pops up.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
Export a signer certificate
a. Select the signer certificate that you want to export.
b. Click Manage > Export.
c. Confirm the save operation in the browser window that pops up.
Delete a signer certificate
a. Select the signer certificate that you want to delete.
b. Click Delete.
c. In the window that pops up, click Yes.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 39.
Load a signer certificate from a server
Use the Load function to retrieve a server certificate from the specified server and port, and then
install this certificate into the keyfile as a signer certificate with a specific label.
a. Click Manage > Load.
b. In the Load Signer Certificate window, specify the following fields:
Server
The server name from which to load the certificate.
Port
The port from which to load the certificate.
Certificate Label
The name to give to the certificate.
c. Click Load.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database of interest.
3. Select Manage > Edit SSL Certificate Database.
4. Click the Personal Certificates tab. All personal certificate names are displayed on this tab.
Note: If the Issuer or Subject field contains characters in a language other than English, these
characters might be displayed in the panel as encoded characters.
Import a personal certificate
a. Click Manage > Import.
b. Click Browse. Then, select the file that contains the personal certificate to import.
Note: Any PKCS 12 file to be imported must have the file extension .p12 for the import
operation to be successful.
116 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
b. Enter Certificate Label, Certificate Distinguished Name, Key Size, and Expiration Time. The
default value for Expiration Time is 365 days.
A distinguished name must be in the following format:
S= and ST= might be used for specifying state. However, the certificate or the certificate
request always uses ST= .
Any error in the distinguished name results in Error box with CTGSK3024W Invalid value
for parameter "-dn" (<entered dn-value>) on save
c. Optionally, select an entry from the Signature Algorithm list. If this option is not specified, the
default signature algorithm is used.
d. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 39.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database of interest.
3. Select Manage > Edit SSL Certificate Database.
4. Click the Certificate Requests tab. All certificate request names are displayed on this tab.
Create a certificate request
a. Click New.
b. Enter Certificate Request Label, Certificate Request Distinguished Name, and Key Size.
A distinguished name must be in the following format:
S= and ST= might be used for specifying state. However, the certificate or the certificate
request always uses ST= .
Any error in the distinguished name results in Error box with CTGSK3024W Invalid value
for parameter "-dn" (<entered dn-value>) on save
c. Optionally, select an entry from the Signature Algorithm list. If this option is not specified, the
default signature algorithm is used.
d. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 39.
View and export a certificate request
a. Select the certificate request that you want to view.
b. Click Manage > View. The content of the certificate request is displayed in the browser.
c. Optional: Click Export. Then, confirm the save operation in the window that pops up.
Export a certificate request
a. Select the certificate request that you want to export.
Procedure
1. From the top menu, select System > Secure Settings > File Downloads.
The displayed directories contain the files that can be downloaded. There are three parent directories:
• access_control contains files specific to the IBM Security Verify Access Advanced Access Control
offering.
Note: This directory is shown only if Advanced Access Control has been activated.
• common contains files that are common across Security Verify Access.
• isva contains files specific to IBM Security Verify Access base offering..
Note: This directory is shown only if the base has been activated.
• federation contains files specific to the IBM Security Verify Access Federation offering.
Note: This directory is shown only if Federation has been activated.
These parent directories might contain sub-directories for different categories of files.
2. Optional: Click Refresh to get the most up-to-date data.
3. Select the file of interest.
4. Click Export to save the file to your local drive.
Note: You must configure the software that blocks pop-up windows in your browser to allow pop-up
windows for the appliance before files can be downloaded.
5. Confirm the save operation in the browser window that pops up.
118 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 8. Docker support
Security Verify Access can run in a Docker environment.
Docker principles
Security Verify Access Docker support was implemented with the following Docker principles in mind.
• Containers are supposed to be ephemeral.
Design them in a way that you can stop and destroy an old container and build a new one with an
absolute minimum of set up and configuration.
• Minimize the images.
To reduce complexity, dependencies, file sizes, and build times, avoid installing extra or unnecessary
packages. For example, do not include a text editor in a database image.
• Single service.
By decoupling applications into multiple containers, you can scale horizontally and reuse containers. For
instance, a web application stack might consist of three separate containers, each with its own unique
image to manage the web application, database, and an in-memory cache in a decoupled manner.
These principles are guidelines from Docker. For more information, see the Best practices for writing
Dockerfiles topic on the Docker website.
Docker terms
The following paragraphs explain some of the common Docker terms that are used throughout this
document.
Image
Docker images are the basis of containers. An Image is an ordered collection of root file system
changes and the corresponding execution parameters for use within a container runtime. An image
typically contains a union of layered file systems that are stacked on top of each other. An image does
not have state and it never changes.
Container
A container is a runtime instance of a Docker image. A Docker container consists of:
• A Docker image
• An execution environment
• A standard set of instructions
Volume
A volume is a specially designated directory within one or more containers that bypasses the Union
File System. Volumes are designed to persist data, independent of the container's lifecycle. For more
information, see https://docs.docker.com/engine/tutorials/dockervolumes/.
For more Docker terms, see the Docker Glossary page on the Docker website.
Docker networking
The Docker host manages the networking of the Docker containers. Docker containers that reside on
the same Docker host can communicate with each other using the internal Docker network. If a Docker
container wants to expose a service or port to servers that are not on the same Docker host, they need
to use the port-mapping capabilities of the Docker host. This capability allows a port from the Docker
container to be mapped to a port on the Docker host.
You expose ports by using the EXPOSE keyword in the Dockerfile or the --expose flag to docker run.
Exposing ports is a way of documenting which ports are used, but does not map or open any ports.
Exposing ports is optional.
You publish ports by using the PUBLISH keyword in the Dockerfile or the --publish flag to docker
run. This keyword tells Docker which ports to open on the container’s network interface. When a port is
published, it is mapped to an available high-order port (higher than 30000) on the host machine, unless
you specify the port to map to on the host server at run time. You cannot specify the port to map to on the
host machine in a Dockerfile because no way exists to guarantee that the port can be available on the host
server where you run the image.
For more information about Docker networking, see the Docker container networking topic on the Docker
website.
120 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
When Security Verify Access runs in a Docker environment, each container provides a single service,
such as configuration, Web Reverse Proxy instance, runtime profile (also known as Advanced Access
Control/Federation), and Distributed Session Cache (DSC). The Security Verify Access Image can run as
any one of these four containers (shown in green boxes). Smaller and more efficient images are provided
as a recommended alternative to using the main Security Verify Access image for the runtime profile (see
Docker image for Verify Access Runtime), the web reverse proxy (see Docker image for Verify Access Web
Reverse Proxy) and the distributed session cache (see Docker image for Verify Access Distributed Session
Cache).
The environment also requires an external user registry and database for runtime (for example, DB2,
Oracle). The runtime database is required only if you use the Advanced Access Control or Federation
capabilities. The external user registry is always required. IBM provides some extensions to third-party
images that can be used to provide these services. These images (icr.io/isva/verify-access-
openldap and icr.io/isva/verify-access-postgresql) are available for download from IBM
Cloud Container Registry.
The configuration container is used as a tool to generate the configuration data. The configuration data is
shared with the runtime containers through one of the following methods:
• Using a shared volume that was mounted to the "/var/shared" directory in the container.
• Manually copying the snapshot to the correct location by using the
Docker commands. The default snapshot file name is "/var/shared/snapshots/
isva_<release_number>_published.snapshot". For example, "/var/shared/snapshots/
isva_10.0.0.0_published.snapshot".
• Using the configuration service that was exposed from the Security Verify Access configuration
container. See con_docker_file_isam.dita.
Images that include all the necessary services to run Security Verify Access in a Docker environment are
provided for download.
‘isva_<product_version>_<snapshot_id>.snapshot’
122 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
FIXPACKS
A space-separated ordered list of fix packs to be applied when the container is started. If this
environment variable is not present, any fix packs present in the fixpacks directory of the
configuration volume are applied in alphanumeric order.
CONFIG_SERVICE_URL
The URL to which the snapshot data is published. When an administrator chooses to publish a
snapshot the generated snapshot file is sent, by way of an HTTP POST operation, to the specified
service. Multiple services can be specified as a comma-separated list.
CONFIG_SERVICE_USER_NAME
The user that is used when a snapshot is published to a remote service.
CONFIG_SERVICE_USER_PWD
The password for the user that is used when a snapshot is published to a remote service.
ADMIN_PWD
The initial seeded password for the built in 'admin' user that is used when the configuration service
is accessed. If this parameter is not specified, the default password 'admin' is used.
Note: This environment variable is not available before version 9.0.5.0.
USE_CONTAINER_LOG_DIR
This environment variable, if set to any value, is used to indicate that the log files is written
to a container-specific logging directory (underneath the '/var/application.logs' path). This
action allows multiple container replicas to write log information to the same persistent volume.
An alternative, in a Kubernetes environment, is to deploy the containers in a 'StatefulSet'. For
information about StatefulSets, see the official Kubernetes documentation.
Note: This environment variable is not available before version 10.0.0.0.
VERIFY_FILES
This environment variable, if set to any value, causes the container to verify all binary files in the
container at start-up to ensure that they were not modified. If this variable is not set, the files are
not checked during the container start-up. By electing to not verify the files, the length of time that
the container takes to start is decreased. It also means that the binary files on the file system do not
get verified to ensure that they were not tampered with.
LANG
The language in which messages which are sent to the console will be displayed. If no language is
specified the messages appear in English. The following table lists the supported languages:
LOGGING_CONSOLE_FORMAT
The required format for the log messages. Valid values are basic or json. The default value is
basic.
LOG_TO_CONSOLE
The types of messages, as a space separated list, which are logged to the console. The following
table lists the valid message types.
system.alerts If set, all system alerts are sent to the console of the
configuration container, and to the destinations that are
configured by using the web console.
Consider the following points about user registry support when you configure Verify Access in a Docker
environment:
• The embedded user registry can only be used only to house the secAuthority=Default
suffix in conjunction with basic users. If full Security Verify Access users are required, the
secAuthority=Default suffix must be stored in an external user registry.
• An external user registry is always required for the user suffix. Configure the external user registry as
a federated user registry if the embedded user registry is being used for the secAuthority=Default
suffix.
124 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• The appliance was configured with an embedded configuration database and an external runtime
database.
• The appliance runtime environment was using an external LDAP server. Alternatively, if the appliance
was running Security Verify Access 9.0.4.0, an embedded LDAP server can be used if the
"wga_rte.embedded.ldap.include.in.snapshot" advanced tuning parameter was set to true
before the snapshot is generated.
When a snapshot from an appliance is imported to a Docker container:
• The LMI HTTPS listening port is rewritten to 9443.
• Any reverse proxy instances have their HTTPS and HTTP ports rewritten to 9443 and 9080.
Take note of the following points when you are migrating to the new lightweight Docker containers:
• The provided container service listens on port 9443, by default, whereas it listens on port 443 when the
legacy verify-access image is used.
• The lightweight containers do not require any elevated container security capabilities and privileges (for
example: the SETUID capability is not required).
• Logging records are sent to the console in JSON format so that the container logging infrastructure
can manage the logging records. No support is provided for natively forwarding logging messages to a
remote syslog server.
• The wrpadmin binary is provided, in the verify-access-wrp image, as an alternative to the legacy
pdadmin binary for managing aspects of the running WebSEAL process.
Restrictions
Security Verify Access, when run in a Docker environment, has the following restrictions:
• Any configuration changes require the service containers to be reloaded. You can use the CLI to trigger
a manual reload. Changes to the Federation configuration and the policy database do not result in
any service downtime. Changes to junction definitions and Web Reverse Proxy configuration results in
minimal service downtime while the Web Reverse Proxy is restarted. See “CLI in a Docker environment”
on page 142.
• The authorization server (pdacld) is not supported.
• The front-end load balancer capability of the Security Verify Access appliance is not supported.
• The IP reputation policy information point (PIP) capability of Advanced Access Control is not supported.
• A sample geo-location database is not provided. If a sample geo-location database is required, obtain
it from the downloads area of a running virtual or hardware appliance. See 'Updating location attributes'
under the Attributes section in "Advanced Access Control Administration".
• Preinstalled federation partner templates are not provided. See 'Managing federation partner templates'
in "Federation Administration topics". The connector package is available from the IBM Security App
Log files
By default, Docker uses a layered file system to help reduce the disk space utilization of the Docker
containers. However, this file system has slower write speeds than standard file systems. As such, a
standard Docker practice is to place any files that are updated frequently (for example, log files) on
a shared volume. All of the log files that are used by Security Verify Access are located in the '/var/
application.logs' directory. Therefore, the recommended approach is to create this directory as a
shared volume when you create your container.
126 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
You can view the log files through the Monitor > Application Log Files panel of the LMI.
Multiple containers must not reference the same persistent volume for log storage, otherwise multiple
containers attempt to write to the same log file at the same time, which causes data write and integrity
issues. In a Kubernetes environment, this problem can be overcome by deploying the containers in a
StatefulSet (see the official Kubernetes documentation for information on StatefulSets). An alternative is
to set the USE_CONTAINER_LOG_DIR environment variable in the container. When this variable is set,
the log files are written to a container-specific log subdirectory. This environment variable is not available
before version 10.0.0.
Note: In IBM Security Verify Access version 9.0.7.0, a container-specific log subdirectory is always used.
The log file directory structure is shown in the following table.
Note: The recommended approach is to configure Security Verify Access to send the log files to a remote
syslog server wherever possible.
Usage
Quick start
To start a container with the defaults, run the command:
However, the following example shows a complete command that specifies the volumes, ports, and
standard environment variables.
Security
By default the image automatically generates a TLS certificate when the container is first started. The CN
for the certificate is obtained from the POSTGRES_SSL_CN environment variable (if defined), otherwise
it is obtained from the container hostname. The generated public key is saved to the '${PGDATA}/
public.pem' file within the container.
If you want to enable unsecure communication with the database server, the POSTGRES_UNSECURE
environment variable must be set to 'true'.
If you want to provide your own certificate, the public certificate and private key must be placed into
a single file (without password protection) and made available to the container during initialization.
The location of the key file within the container is defined by the POSTGRES_SSL_KEYDB environment
variable.
If you want to create your own self-signed server certificate, you can do so by using OpenSSL. For
example,
User ID
By default the container runs as the 'postgres' (uid: 70) user. If a volume is being used to persist
the database, the 'postgres' user must be granted write permission to the volume. In a Kubernetes
environment, this action can be achieved by setting the fsGroup field in the deployment yaml file.
License
The Dockerfile and associated scripts are licensed under the Apache License 2.0 license.
128 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Supported Docker versions
• This image is officially supported on Docker version v17 and later.
• Support for older versions is provided on a best-effort basis.
Community support
If you are a licensed IBM customer, you can request support through the official IBM support channel.
However, IBM does not support the official postgres Docker image.
Community support is also available for this image from the DeveloperWorks communities. Both
DeveloperWorks Answers and the DeveloperWorks IBM Security Identity and Access Management Forum
are vibrant communities.
Supported tags
Table 16. Supported tags
Tag Purpose
latest The newest stable version.
V.R.M.F A particular release, of the format {version}.{release}.
{modfication}.{fixpack}. For example, 10.0.0.0.
Related information
Points to note
Some points to note about the extensions to the osixia/openldap Docker image.
• The secAuthority=Default suffix is stored in the "/var/lib/ldap.secAuthority" directory
and must be added to the list of volumes of the osixia/openldap container.
• Using the osixia/openldap-backup Docker container to back up the user registry is not supported.
• The secAuthority=Default suffix contains the "cn=root,secAuthority=Default"
administrative user. The password for the user is set to the same value as the admin user of the
osixia/penldap container (controlled by the LDAP_ADMIN_PASSWORD variable).
• The user suffix is automatically determined from the LDAP_DOMAIN entry, where each element in
the domain name is preceded by "dc". For example, if the LDAP_DOMAIN is set to ibm.com, the
corresponding suffix is "dc=ibm,dc=com".
• The default value of the LDAP_TLS_VERIFY_CLIENT environment variable was changed from
'required' to 'never'.
• By default, the LDAP server listens only on the LDAPS secure port (636) and does not listen on the LDAP
unsecure port (389).
Usage
Quick start
To start a container with the defaults, run the command:
However, a complete command that specifies the volumes, ports, and standard environment variables, is
shown in the following example.
TLS
By default, the image automatically generates a TLS certificate when the container is first started. The CN
for the certificate is obtained from the container hostname.
If you want to provide your own certificates, they must be made available to the container at initialization
within the /container/service/slapd/assets/certs directory. The following files are within this
directory:
If you want to create your own self-signed server certificate, you can do so by using OpenSSL. For
example,
130 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
License
The Dockerfile and associated scripts are licensed under the Apache License 2.0 license.
oc create sa openldap
oc adm policy add-scc-to-user anyuid –z opendlap
apiVersion: apps/v1
kind: Deployment
spec:
template:
spec:
serviceAccountName: openldap
containers:
. . .
Community support
If you are a licensed IBM customer, you can request support through the official IBM support channel.
However, IBM does not support the official osixia/openldap Docker image.
Community support is also available for this image from the DeveloperWorks communities. Both
DeveloperWorks Answers and the DeveloperWorks IBM Security Identity and Access Management Forum
are vibrant communities.
Supported tags
Table 19. Supported tags
Tag Purpose
latest The newest stable version.
V.R.M.F A particular release, of the format {version}.{release}.
{modfication}.{fixpack}. For example, 10.0.0.0.
Related information
‘isva_<product_version>_<snapshot_id>.snapshot’
132 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
LANG
The language in which messages which are sent to the console will be displayed. If no language is
specified the messages will appear in English. The following table lists the supported languages:
FIXPACKS
A space-separated ordered list of fix packs to be applied when starting the container. If this
environment variable is not present, and the CONFIG_SERVICE_URL environment has not been
set, any fix packs present in the fixpacks directory of the configuration volume will be applied in
alphanumeric order.
Configuration
All configuration activities must be completed using the main Security Verify Access image, running as a
configuration container. The configuration container supports a scaled-down version of the Security Verify
Access appliance LMI. You can use this LMI to manage the configuration data.
Note: To make a configuration available to the runtime container, you must click Publish configuration in
the LMI.
Service
The container, by default, will listen for incoming requests on port 9443, and optionally port 9080 (if
HTTP access has been enabled in the configuration snapshot). Use the HTTPS_PORT and HTTP_PORT
environment variables to change the ports on which the container will listen.
Logging
The logging and auditing of the runtime will,by default,be sent to the console of the container, in JSON
format. This allows the logging infrastructure of the container environment itself to manage the auditing
and message logs.
Some additional log files will however still be generated on the disk of the container. By default, Docker
uses a layered file system to help reduce the disk space utilization of the containers. However, this
file system has slower write speeds than standard file systems. As such, a standard Docker practice
is to place any files that are updated frequently (for example, log files) on a shared volume. All of the
log files that are written by the container are located in the '/var/application.logs.' directory.
Therefore, the recommended approach is to create this directory as a shared volume when you create
your container.
Note: Multiple containers should not reference the same persistent volume for log storage, otherwise
multiple containers will attempt to write to the same log file at the same time, causing data write and
integrity issues. In a Kubernetes environment this problem can be overcome by deploying the containers
in a StatefulSet (refer to the official Kubernetes documentation for information on StatefulSets).
The log file directory structure is shown in the following table.
134 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
CONFIG_SERVICE_URL
The URL that will be used to access the published configuration data. If using the configuration
service of the Security Verify Access configuration container, the URL would be of the format:
https://<container-ip>:<mapped-port>/shared_volume. A BA header will be supplied to
handle authentication to the configuration service. If this environment variable is not specified the
container will expect the configuration snapshot to be available in the shared configuration volume,
at /var/shared/snapshots.
CONFIG_SERVICE_USER_NAME
The name of the user that will be used when accessing the configuration service.
CONFIG_SERVICE_USER_PWD
The password for the user that will be used when accessing the configuration service.
CONTAINER_TIMEZONE
The timezone that is used by the container. For example: "Australia/Brisbane".
HTTP_PORT
The port on which the container will listen for HTTP request (default: 9080).
Note: If the port number is less than 1024 the NET_BIND_SERVICE capability is required for the
container.
HTTPS_PORT
The port on which the container will listen for HTTPS request (default: 9443).
Note: If the port number is less than 1024 the NET_BIND_SERVICE capability is required for the
container.
SNAPSHOT
The name of the configuration data snapshot file that is to be used when starting the container.
No path information should be included in the filename. The standard snapshot locations will be
searched for the specified snapshot file. This variable, if not specified, will default to the latest
published configuration.
SNAPSHOT_ID
The identifier of the snapshot that is used by the container. The full snapshot name is constructed
as:
‘isva_<product_version>_<snapshot_id>.snapshot’
FIXPACKS
A space-separated ordered list of fix packs to be applied when starting the container. If this
environment variable is not present, and the CONFIG_SERVICE_URL environment has not been
set, any fix packs present in the fixpacks directory of the configuration volume will be applied in
alphanumeric order.
Configuration
All configuration activities must be completed using the main Security Verify Access image, running as a
configuration container. The configuration container supports a scaled-down version of the Security Verify
Access appliance LMI. You can use this LMI to manage the configuration data.
Note: To make a configuration available to the WRP container, you must click Publish configuration in the
LMI.
Service
The container, by default, will listen for incoming requests on port 9443, and optionally port 9080 (if
HTTP access has been enabled in the configuration snapshot). Use the HTTPS_PORT and HTTP_PORT
environment variables to change the ports on which the container will listen.
136 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
the CONFIG_SERVICE_URL environment variable has been specified the required 'fixpacks' must be
specified using the FIXPACKS environment variable.
Logging
The logging of the WRP process will, by default, be sent to the console of the container, in JSON format.
This allows the logging infrastructure of the container environment itself to manage the message logs.
The WRP configuration controls which auditing records are enabled, and where the auditing records are
sent. It is recommended that all auditing records (including the WRP request log) are also written to the
console of the container in JSON format. This can be achieved by:
1. Changing the logging agent which is used for the auditing, controlled by the 'logcfg' configuration entry,
to 'stdout'.
2. Enabling JSON auditing, controlled by the 'audit-json' configuration entry.
3. Modifying the request log destination so that it is set to 'stdout'.
4. Modifying the request log format string so that the data is formatted as JSON.
For example:
[aznapi-configuration]
audit-json = yes
logcfg = audit.azn:stdout
[logging]
requests-file = stdout
request-log-format = {"host":"%h", "user":"%u", "time":"%t"}
Some additional log files will however still be generated on the disk of the container. By default, Docker
uses a layered file system to help reduce the disk space utilization of the containers. However, this file
system has slower write speeds than standard file systems. As such, a standard Docker practice is to
place any files that are updated frequently (for example, log files) on a shared volume. All of the log files
that are written by the container are located in the '/var/application.logs' directory. Therefore, the
recommended approach is to create this directory as a shared volume when you create your container.
Note: Multiple containers should not reference the same persistent volume for log storage, otherwise
multiple containers will attempt to write to the same log file at the same time, causing data write and
integrity issues. In a Kubernetes environment this problem can be overcome by deploying the containers
in a StatefulSet (refer to the official Kubernetes documentation for information on StatefulSets).
The log file directory structure is shown in the following table.
‘isva_<product_version>_<snapshot_id>.snapshot’
138 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Japanese ja_JP.utf8
Korean ko_KR.utf8
Polish pl_PL.utf8
Portuguese (Brazil) pt_BR.utf8
Russian ru_RU.utf8
Chinese (Simplified) zh_CN.utf8
Chinese (Traditional) zh_TW.utf8
FIXPACKS
A space-separated ordered list of fix packs to be applied when starting the container. If this
environment variable is not present, and the CONFIG_SERVICE_URL environment has not been
set, any fix packs present in the fixpacks directory of the configuration volume will be applied in
alphanumeric order.
Configuration
All configuration activities must be completed using the main Security Verify Access image, running as a
configuration container. The configuration container supports a scaled-down version of the Security Verify
Access appliance LMI. You can use this LMI to manage the configuration data.
Note: To make a configuration available to the DSC container, you must click Publish configuration in the
LMI.
Service
The container will listen for incoming service and replication requests on the ports specified in the DSC
configuration panel of the LMI.
Environment Variables
The verify-access-snapshotmgr image uses the following environment variables.
USERNAME
The name of the user that is used for authenticating to the web service. The username must
correspond to the CONFIG_SERVICE_USER_NAME environment variable in the runtime containers.
PASSWORD
The password of the user that is used for authenticating to the web service. The password must
correspond to the CONFIG_SERVER_USER_PWD environment variable in the runtime containers.
KEYFILE
The name of the file that holds the server certificate and key. This file must be available on the file
system within the container. When KEYFILE is not specified, a self-signed certificate is created when
the container first starts.
Usage
Quick start
An example command that starts the snapshotmgr container.
A complete command, which specifies the volumes, ports and standard environment variables.
Security
By default, the image automatically generates a TLS certificate when the container is first started. The CN
for the certificate is obtained from the container hostname.
140 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
If you want to provide your own certificate, place the public certificate and private key into a single file
(without password protection) and make it available to the container during initialization. The location of
the key file within the container is defined by the KEYFILE environment variable.
This example command creates a self-signed server certificate by using OpenSSL:
User ID
By default, the container runs as the guest (uid: 405) user. If a volume is being used to persist the
snapshot files (located in the /data directory), the guest user must be granted write permission to the
volume. In a Kubernetes environment, configure the fsGroup field in the deployment yaml file.
From v10.0.2.0 onwards, the configuration container is also able to automatically push the snapshot
to the snapshotmgr service whenever the configuration is published from the LMI. To have the
configuration automatically pushed the CONFIG_SERVICE_XXX, environment variables must be set to
point to the snapshotmgr service. By way of example, the following environment variables would be set
in the configuration container to push the configuration to the snapshotmgr service:
curl -k -u testuser:passw0rd \
-O https://snapshotmgr:9443/snapshots/isva_10.0.5.0_published.snapshot
License
The Dockerfile and associated scripts are licensed under the Apache License 2.0 license.
Community support
If you are a licensed IBM customer, you can request support through the official IBM support channel.
However, IBM does not offer support for the official Python Docker image.
Community support is also available for this image from the IBM Security Verify IBM Security Community.
Supported tags
Table 24. Supported tags
Tag Purpose
latest The current stable version.
V.R.M.F The release version in the V.R.M.F format, which
is {version}.{release}.{modfication}.{fixpack}. For
example, 10.0.5.0
142 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
The supported options include:
all
Reload the entire configuration. This will involve some minimal service interruption while the services
are restarted.
check
Check whether the container is running with the latest snapshot.
policy
Reload the Security Verify Access policy database. No service interruption will occur as a result of this
operation. The policy option is only available in Web Reverse Proxy containers.
runtime
Reload the federation and advanced access control runtime information. No service interruption will
occur as a result of this operation. The runtime option is only available in runtime containers.
force
Use this option to force the use of the locally cached data in the event that the configuration service is
unavailable.
Scenarios
These scenarios illustrate some of the typical situations an administrator encounters when using Security
Verify Access in Docker environment and what actions the administrator can take in such situations.
Scenario - Upgrade
The security administrator currently has Security Verify Access running in a docker environment. A new
version of Security Verify Access was just released and so the administrator wants to upgrade the
environment to this newest version.
The administrator completes the following steps.
1. Pull the newest Security Verify Access image from IBM Cloud Container Registry.
2. Start a new configuration container by using the newest Security Verify Access image.
• When the image starts, it automatically converts the data found in the configuration volume to the
newest version.
• The legacy data files continue to exist so that Security Verify Access containers that are running the
older version of Security Verify Access can continue to operate.
3. Start each service, one at a time, by using the newest Security Verify Access images.
• As each new service is started, stop the corresponding service that is running the older version of the
image.
• The services from the old version and services from the new version can co-exist in the environment.
However, configuration changes to the services from the old version must be made by using a
configuration container also at the old version.
Note: In v10.0.2, a new light weight and more secure container was provided for the Security Verify
Access Runtime (AAC and Federation), the Web Reverse Proxy, and the Distributed Session Cache
capabilities. To migrate to these new images from the legacy Verify Access image, re-create the
containers by using all the existing definitions, except for the image name. The image name must be
changed to the new image name. Change the service port for the Runtime and Web Reverse Proxy
containers from 443 to 9443. Otherwise, set the port to a custom value by using the HTTPS_PORT
environment variable.
144 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
8. Start the AAC/Federation runtime container.
Note: When you run the AAC Auto Configuration Tool, use the configuration container’s address and port
for the Security Verify Access appliance LMI hostname and port, and the AAC LMI hostname and port
arguments. Use the AAC runtime container’s address and port (port 9080 or 9443 by default when the
Security Verify Access Runtime image) is used for the AAC runtime listening interface hostname and port
arguments.
Orchestration
As each Docker container provides a single service, multiple containers with dependencies among them
are usually required for a single environment. To simplify and automate the process, you can use Docker
orchestration tools to deploy Security Verify Access to a Docker environment.
The orchestration tools that have been validated against Security Verify Access include Kubernetes and
Docker Compose.
Kubernetes support
Kubernetes is an Open Source system for automating deployment, scaling, and management of
containerized applications.
It provides features such as:
• Self-healing
• Horizontal scaling
• Service discover and load balancing
• Secret and configuration management
Further information on Kubernetes can be found on the official Kubernetes website: https://
kubernetes.io/.
Repository
The Security Verify Access image is available from the IBM Cloud Container Registry repository:
'icr.io/isva/verify-access', 'icr.io/isva/verify-access-runtime', 'icr.io/isva/
verify-access-wrp', and 'icr.io/isva/verify-access-dsc'.
Secrets
Never store sensitive information like passwords, directly in the yaml deployment descriptors. Instead,
store them within a Kubernetes secret and then reference the secret in the yaml deployment descriptors.
Instructions on how to use Kubernetes secrets can be found in the official Kubernetes documentation
https://kubernetes.io/docs/concepts/configuration/secret/.
In the examples that are provided, a ‘secret’ is used to store the Verify Access administration password.
The following example is a command to create the ‘secret’. Ensure that the kubectl context is set to the
correct environment before this command is run.
Service Accounts
Service accounts can be used to provide an identity for processes that run in a Pod. Information on the
usage of service accounts can be found in the official Kubernetes documentation: https://kubernetes.io/
docs/tasks/configure-pod-container/configure-service-account/.
In the examples that are provided, the deployment descriptors use the ‘isva’ service account. The
kubectl utility can be used to create the ‘isva’ service account. Ensure that the kubectl context is
set to the correct environment before this command is run.
#
# The deployment description of the Verify Access configuration container. This
# container is used to manage the configuration of the Verify Access
# environment.
#
apiVersion: apps/v1
kind: Deployment
metadata:
name: isva-config
labels:
app: isva-config
spec:
selector:
matchLabels:
app: isva-config
template:
metadata:
labels:
app: isva-config
spec:
# The name of the service account which has the required
# capabilities enabled for the isva container.
serviceAccountName: isva
146 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
securityContext:
runAsNonRoot: true
runAsUser: 6000
containers:
- name: isva-config
readinessProbe:
exec:
command:
- /sbin/health_check.sh
initialDelaySeconds: 5
periodSeconds: 10
startupProbe:
exec:
command:
- /sbin/health_check.sh
- startupProbe
initialDelaySeconds: 30
periodSeconds: 10
failureThreshold: 30
---
#
# The service description of the Verify Access configuration service. The
# service is only accessible from within the Kubernetes cluster.
#
apiVersion: v1
kind: Service
metadata:
name: isva-config
spec:
selector:
app: isva-config
type: ClusterIP
4. You can monitor the bootstrapping of the container by using the 'logs' command:
5. Start the Kubernetes proxy so that you are able to access the web management console of the
configuration container. An alternative approach is to create a Kubernetes service that directly exposes
the LMI port of the configuration container.
#
# The deployment description of the Verify Access Web Reverse Proxy
# container.
#
apiVersion: apps/v1
kind: Deployment
metadata:
name: isva-wrp
labels:
app: isva-wrp
spec:
selector:
matchLabels:
app: isva-wrp
replicas: 1
template:
metadata:
labels:
app: isva-wrp
spec:
# The name of the service account which has the required
# capabilities enabled for the verify-access container.
serviceAccountName: isva
148 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
containers:
- name: isva-wrp
readinessProbe:
exec:
command:
- /sbin/health_check.sh
timeoutSeconds: 3
startupProbe:
exec:
command:
- /sbin/health_check.sh
- startupProbe
initialDelaySeconds: 5
failureThreshold: 30
timeoutSeconds: 20
4. You can monitor the bootstrapping of the container by using the 'logs' command:
kubectl logs -f `kubectl get -o json pods -l app=isva-wrp | jq -r .items[0].metadata.name`
5. Create a configuration file that is named wrp-service.yaml. This configuration file defines a
WebSEAL service that can be used to access WebSEAL. The type of service that is defined is different
based on whether the 'load balancer' service type is supported in the environment.
The following definition can be used if the 'load balancer' service type is not supported in your
environment:
#
# The service description of the Verify Access Web Reverse Proxy
# service. This is the entry point into the environment and can be
# accessed over port 30443 from outside of the Kubernetes cluster.
#
apiVersion: v1
kind: Service
metadata:
name: isva-wrp
selector:
app: isva-wrp
type: NodePort
The following definition can be used it the 'load balancer' service type is supported in your
environment:
7. a. If a 'LoadBalancer' service was defined, determine the external IP address of the service, and
then use your browser to access WebSEAL (port 443).
b. If a 'NodePort' service was defined, determine the IP address of the Kubernetes cluster,
and then use your browser to access the Web Reverse Proxy (port 30443). In a 'minikube'
environment the IP address of the cluster can be obtained with the following command:
minikube ip
In an IBM cloud environment, the IP address of the cluster can be obtained with the following
command:
Runtime Container
The Verify Access Runtime Container (called verify-access-runtime or Verify Access Liberty Runtime)
provides the advanced authentication, context-based access, and federation services. The verify-
access-runtime container retrieves a snapshot from the configuration container in the same manner
as the Web Reverse Proxy Container. Because the Web Reverse Proxy container always acts as a point of
contact for the runtime service, no need to listen externally on a NodePort exists. Instead, it exposes only
its HTTPS interface on the cluster network with the isva-runtime service.
The following steps illustrate how to create a runtime container:
1. Ensure that the kubectl context is set to the correct environment. The mechanism to do this setting
differs, based on the Kubernetes environment that is being used.
2. Create a configuration file that is named runtime-container.yaml. This configuration file defines a
runtime container that can be used to secure access to your web applications:
#
# The deployment description of the Verify Access runtime profile container.
150 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
# This container provides the Federation and Advanced Access Control
# capabilities of Verify Access.
#
apiVersion: apps/v1
kind: Deployment
metadata:
name: isva-runtime
labels:
app: isva-runtime
spec:
selector:
matchLabels:
app: isva-runtime
replicas: 1
template:
metadata:
labels:
app: isva-runtime
spec:
# The name of the service account which has the required
# capabilities enabled for the isva container.
serviceAccountName: isva
containers:
- name: isva-runtime
readinessProbe:
exec:
command:
- /sbin/health_check.sh
timeoutSeconds: 3
startupProbe:
exec:
command:
- /sbin/health_check.sh
- startupProbe
initialDelaySeconds: 5
---
#
# The service description of the isva runtime profile service. The
# service is only accessible from within the Kubernetes cluster.
#
apiVersion: v1
kind: Service
metadata:
name: isva-runtime
spec:
ports:
- port: 443
targetPort: 9443
name: isva-runtime
selector:
app: isva-runtime
type: ClusterIP
4. You can monitor the bootstrapping of the container by using the 'logs' command:
#
# The deployment description of the Verify Access distributed session
# cache container.
#
apiVersion: apps/v1
kind: Deployment
metadata:
name: isva-dsc
labels:
app: isva-dsc
spec:
selector:
matchLabels:
app: isva-dsc
template:
metadata:
labels:
app: isva-dsc
spec:
152 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
# The name of the service account which has the required
# capabilities enabled for the isva container.
serviceAccountName: isva
containers:
- name: isva-dsc
readinessProbe:
exec:
command:
- /sbin/health_check.sh
timeoutSeconds: 3
startupProbe:
exec:
command:
- /sbin/health_check.sh
- startupProbe
initialDelaySeconds: 5
failureThreshold: 30
timeoutSeconds: 20
---
#
# The service description of the verify-access distributed session
# cache service. The service is only accessible from within the
# Kubernetes cluster.
#
apiVersion: v1
kind: Service
metadata:
name: isva-dsc
spec:
ports:
- port: 443
name: isva-dsc
type: ClusterIP
4. The 'dscadmin' command can be used to directly administer the distributed session cache:
5. You can monitor the bootstrapping of the container by using the 'logs' command:
Kubernetes Environments
The following Kubernetes environments are validated by using the Security Verify Access image:
Minikube
Minikube is a tool that runs Kubernetes locally. Minikube runs a single-node Kubernetes cluster
inside a VM on your laptop for users looking to try out Kubernetes or develop with it day-to-day.
For more information, see the Minikube website. https://kubernetes.io/docs/getting-started-guides/
minikube/
To set the context for the kubectl utility, use the following command.
IBM Cloud
The IBM cloud container service provides advanced capabilities for building cloud-native
apps, adding DevOps to existing apps, and relieving the pain around security, scale, and
infrastructure management. Further information can be obtained from the IBM Cloud website: https://
www.ibm.com/cloud/container-service
To set the context for the kubectl utility, use the IBM Cloud CLI to obtain the kubectl configuration
file.
bx cs cluster-config <cluster-name>
154 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
To set the context for the kubectl utility, use the Google Cloud CLI:
oc login
The oc binary is the preferred mechanism for accessing the OpenShift CLI and can be used
interchangeably with the kubectl utility.
The default security context that is enabled by Red Hat OpenShift is too restrictive for the main Verify
Access container. As a result of this a less restrictive security context must be enabled for the service
account that runs the main Verify Access containers. In the following examples, the ‘Verify Access’
service account is used.
Note: The default security context is adequate for the verify-access-runtime, verify-access-wrp, and
verify-access-dsc containers. When the default security context is used, the ‘isam’ user (uid: 6000)
that is defined by the runAsUser entry, must not be specified in the deployment descriptor.
The pre-defined ‘anyuid’ security context can be used, but it does provide more capabilities that are
not required by the main Verify Access containers. To create a security context with the minimum set
of capabilities required for the main Verify Access containers, take the following steps.
1. Ensure that the oc binary is available in the environment and that a login was already performed.
2. Create a configuration file that is named -scc.yaml. This configuration file defines a new security
context that can be used by the Verify Access containers:
#
# The minimum security context constraints which are required to run
# the Verify Access container. We cannot use the 'restricted' security
# constraint as we need additional capabilities which would otherwise
# be denied to the container. The 'anyuid' security constraint may
# be used, but it allows additional capabilities which are not
# required by the container.
#
kind: SecurityContextConstraints
apiVersion: v1
# The Verify Access container needs to be run as a 'custom' user, but does
# not need to run as the root user.
runAsUser:
type: MustRunAsNonRoot
seLinuxContext:
type: MustRunAs
# By default we drop all capabilities and then only add back in the
# capabilities which are required by the Verify Access container.
requiredDropCapabilities:
- ALL
defaultAddCapabilities:
- CHOWN
- DAC_OVERRIDE
- FOWNER
- KILL
- NET_BIND_SERVICE
- SETFCAP
- SETGID
- SETUID
oc create -f -isva-scc.yaml
Helm Charts
Helm Charts help you define, install, and upgrade even the most complex Kubernetes application.
Helm helps you manage Kubernetes applications. Charts are easy to create, version, share, and publish.
For more information on Helm, see https://helm.sh/.
IBM now provides a helm chart that can be used to deploy an IBM Security Verify Access environment.
The helm chart is available from the IBM Security charts repository in GitHub: https://github.com/IBM-
Security/helm-charts/tree/master/stable/ibm-sam.
This chart allows you to deploy a complete IBM Security Verify Access environment, including the
following containers:
• Configuration
• WebSEAL
• Runtime
• Distributed Session Cache
• PostgreSQL Database (although this should only be used in test environments - an external database
should always be used in production environments)
The following diagram shows the components of the ibm-sam Helm chart:
156 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Note:
• Multiple Web Reverse Proxy instances can be created;
• The Distributed Session Cache will support a primary/secondary instance (active-passive);
• Each of the containers will retrieve configuration information from the configuration service of the
configuration container.
Additional information can be found in the README.md file provided with the Helm chart.
version: '3'
services:
#
# Security Verify Access Containers
#
isva-config:
image: icr.io/isva/verify-access:${ISVA_VERSION}
hostname: isva-conf
environment:
- SERVICE=config
# - SNAPSHOT=${SNAPSHOT}
# - FIXPACKS=${FIXPACKS}
# - ADMIN_PWD=${ADMIN_PWD}
isva-webseal:
image: icr.io/isva/verify-access-wrp:${ISVA_VERSION}
hostname: isva-webseal
environment:
- INSTANCE=${WEBSEAL_INSTANCE_NAME}
# - SNAPSHOT=${SNAPSHOT}
volumes:
- ./isva-volume:/var/shared
- ./isva-logs/webseal:/var/application.logs
ports:
- "${WEBSEAL_HTTPS_PORT}:9443"
- "${WEBSEAL_HTTP_PORT}:9080"
depends_on:
- isva-ldap
- isva-dsc
isva-aac:
image: icr.io/isva/verify-access-runtime:${ISVA_VERSION}
hostname: isva-aac
environment:
- SERVICE=runtime
volumes:
- ./isva-volume:/var/shared
- ./isva-logs/aac:/var/application.logs
ports:
- "${AAC_HTTPS_PORT}:9443"
- "${AAC_HTTP_PORT}:9080"
depends_on:
- isva-ldap
- isva-db
- isva-webseal
- isva-dsc
isva-dsc:
image: icr.io/isva/verify-access-dsc:${ISVA_VERSION}
hostname: isva-dsc
environment:
- INSTANCE=1
# - SNAPSHOT=${SNAPSHOT}
# - FIXPACKS=${FIXPACKS}
volumes:
- ./isva-volume:/var/shared
ports:
- "${DSC_SERVICE_PORT}:443"
- "${DSC_REPLICA_PORT}:444"
#
# Service Containers
#
isva-ldap:
image: icr.io/isva/verify-access-openldap:${ISVA_VERSION}
hostname: isva-ldap
environment:
- LDAP_ADMIN_PASSWORD=${LDAP_PASSWORD}
# - LDAP_CONFIG_PASSWORD=${LDAP_CONFIG_PASSWORD}
# - LDAP_BASE_DN=${LDAP_BASE_DN}
# - LDAP_TLS_VERIFY_CLIENT=${LDAP_TLS_VERIFY_CLIENT}
# - LDAP_DOMAIN=${LDAP_DOMAIN}
# - LDAP_ORGANISATION=${LDAP_ORGANISATION}
# - LDAP_ENABLE_PORT_389=${LDAP_SSL_DISABLED}
volumes:
- libldap:/var/lib/ldap
- ldapslapd:/etc/ldap/slapd.d
- libsecauthority:/var/lib/ldap.secAuthority
ports:
# - ${LDAP_PORT}:389
- ${LDAPS_PORT}:636
158 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
isva-db:
image: icr.io/isva/verify-access-postgresql:${ISVA_VERSION}
hostname: isva-db
environment:
- POSTGRES_DB=${DB_NAME}
- POSTGRES_USER=${DB_USER}
- POSTGRES_PASSWORD=${DB_PASSWORD}
- POSTGRES_SSL_CN=${DB_CN}
# - POSTGRES_UNSECURE=${DB_SSL_DISABLED}
volumes:
- pgdata:/var/lib/postgresql/data
ports:
- "${DB_PORT}:5432"
Environment
The environment is defined in the following .env file.
ISVA_VERSION=10.0.6.0
TIMEZONE=Australia/Brisbane
#
# Security Verify Access CONTAINERS
#
# The name of the snapshot which is to be used when starting the container.
# The snapshot must reside in <shared-volume>/snapshots
# SNAPSHOT=
# Config Container
CONFIG_HTTPS_PORT=10443
# AAC Container
AAC_HTTP_PORT=11080
AAC_HTTPS_PORT=11443
# DSC Container
DSC_SERVICE_PORT=13443
DSC_REPLICA_PORT=13444
#
# SERVICE CONTAINERS
#
# LDAP Container
LDAP_PORT=14389
LDAPS_PORT=14636
LDAP_DOMAIN=ldap.ibm.com
LDAP_PASSWORD=passw0rd
LDAP_ORGANISATION=isva
LDAP_BASE_DN=cn=isva
LDAP_CONFIG_PASSWORD=passw0rd
LDAP_TLS_VERIFY_CLIENT=false
LDAP_SSL_DISABLED=true
# Database Container
DB_PORT=15432
DB_CN=isva
DB_SSL_DISABLED=false
DB_USER=postgres
DB_PASSWORD=passw0rd
DB_NAME=isva
Overview
This Docker Compose configuration defines an environment with the following containers:
Quick start
Place the 'docker-compose.yaml' and '.env' files into a new directory. From that directory, run the
following command to start the test environment:
docker-compose up -d
This command creates and starts all of the containers in the environment.
To access the LMI, open your web browser and visit:
https://{docker-host}:10443
or
https://{docker-host}:CONFIG_HTTPS_PORT if .env has been customized
docker-compose down
160 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Note: The data that is stored on the shared configuration volume and log file directories are not removed
when the environment is destroyed.
Extra commands
Some example commands for some common Docker Compose tasks are listed in the following table:
Table 25. Example commands for some common Docker Compose tasks
Task Command
Run just the configuration service container and its docker-compose run isva-config
dependencies.
Stop the LDAP service container. docker-compose stop isva-ldap
Remove the stopped LDAP service container. docker-compose rm isva-ldap
Re-create the Database service container. docker-compose up --force-recreate -d
isva-db
For more information about Docker Compose, see the Docker Compose website. (https://
docs.docker.com/compose/)
Kubernetes Operator
Operators are software extensions to Kubernetes that use custom resources to manage applications and
their components. Operators follow Kubernetes principles, notably the control loop.
The IBM Security Verify Access operator provides lifecycle management of the Verify Access lightweight
worker containers.
• Web Reverse Proxy
• Runtime
• Distributed Session Cache
The operator manages the deployment of these lightweight IBM Security Verify Access worker containers,
and also control the rolling restart of these containers when a configuration snapshot is updated, as
illustrated in the following figure:
162 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
automatically updated if the DSC configuration changes, set the value of the dsess-auto-update entry
in the [session] stanza in the WebSEAL configuration file to no.
The SSL certificates that are used by the DSC are stored in the dsc_key_store key store. This key store
is initially populated with a self-signed certificate that is used when connecting to the DSC servers.
The self-signed certificate can be replaced with a CA-signed certificate using the SSL Certificates
management page of the LMI.
To start the DSC container within a Docker environment, specify the Docker environment variable
INSTANCE = '1|2|3|4' at container start time. The instance number corresponds to the role that
the DSC container will play in the environment (1 corresponds to primary, 2 corresponds to secondary,
3 corresponds to tertiary, 4 corresponds to quaternary). You can configure up to four DSC servers in
your environment for high availability of the DSC. See 'Failover for the distributed session cache' under
Chapter 6. Distributed Session Cache > Distributed session cache overview in "Web Reverse Proxy
Configuration topics".
These annotations must be added to the deployment metadata for each IBM Security Verify Access
container. The following code snippet demonstrates how the required Kubernetes annotations can be
added to a deployment.
Note: Details about the container template selection or configuration were omitted for conciseness.
164 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 9. Deployment methodologies
Read this section to understand the deployment architectures.
Cluster support
The Security Verify Access appliance includes cluster support, which allows multiple appliances to share
configuration information and runtime information to work together in a clustered environment.
For information about how to configure and administer a cluster in the LMI, see “Managing cluster
configuration ” on page 70.
166 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Data replication in a cluster
Cluster members share data that is relevant to the Security Verify Access configuration. You can update
the configuration data on the primary master only. The other nodes in the cluster maintain local read-only
replicas of the data from the primary master.
Any change to the cluster configuration or runtime parameters policy is automatically synchronized and
applied to every node in the cluster. The Cluster Configuration management page in the LMI lists the
nodes in the cluster. This list includes a Status column to indicate the status of the synchronization of
system settings across the cluster.
If the changes to the system settings are not synchronized correctly on a particular node, the cluster
administrator must investigate the problem. The administrator can examine the various log files on
the node to determine why the change did not deploy successfully. When the problem is fixed, the
administrator can either reboot the node, or rejoin the node to the cluster so that it applies the changes
again.
Note: The Status column indicates whether the system settings on each node are up-to-date. This
column does not indicate the status of any other synchronizations.
The data that is replicated across the cluster includes security settings, geolocation data, and system
settings.
You can optionally configure the cluster to replicate the Security Verify Access runtime settings and the
certificate database settings. Replicating the runtime settings can provide high availability for the Policy
Server. For more information, see “High availability for the policy server” on page 170.
Security Settings
In an IBM Security Verify Access appliance cluster, the nodes share configuration data and runtime data
that is related to the security settings.
Configuration data
• One-time password (OTP) mapping rules.
• Policy information such as risk profiles, attributes, and obligations.
• Configuration information such as user registry data.
• All of the advanced configuration data.
Geolocation data
• Data that maps ranges of IP addresses to geographic locations.
Runtime data
• Session data.
• Non-session data that is relevant to the cluster, such as one-time passwords.
• Template files.
System settings
In an IBM Security Verify Access appliance cluster, the nodes share some system settings.
Cluster configuration
The cluster configuration information is replicated across the nodes of the cluster.
Runtime tuning parameters
The advanced tuning parameters are replicated across the nodes of the cluster.
Runtime settings
By default, the policy server configuration and policy database is not replicated across the cluster.
However, you can choose to replicate this data. For more information about this configuration, see the
"Replicate settings across the cluster" details in “Managing cluster configuration ” on page 70.
Table 26. Possible architectures for clusters that contain multiple nodes
Number
of Combination of
masters masters Considerations
1 Primary master only. No failover for cluster services.
2 Primary master and This configuration includes a secondary master to provide failover
secondary master. for the cluster services, which include the distributed session
cache (DSC), configuration database, geolocation database, and
runtime database.
3 Primary master, You can optionally designate a tertiary master to provide extra
secondary master, and failover for the distributed session cache.
tertiary master.
Only the distributed session cache recognizes the tertiary master
node. The configuration, geolocation, and runtime databases
consider the tertiary node as a non-master node.
4 Primary master, You can optionally designate tertiary and quaternary masters to
secondary master, provide extra failover for the distributed session cache.
tertiary master, and
Only the distributed session cache recognizes the tertiary and
quaternary master.
quaternary master nodes. The configuration, geolocation, and
runtime databases consider these nodes as non-master nodes.
For high availability in a cross data center environment, you can consider separating the master
appliances between the data centers as depicted in Figure 3 on page 169.
168 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Figure 3. Example cluster architecture
This figure shows the data replication and service availability across the master nodes.
Distributed session cache
The primary master maintains the master copy of the distributed session cache and the other master
nodes keep replica copies for failover purposes.
Runtime database
If you are using the internal runtime database, the primary master maintains the master copy of this
data, while the secondary master keeps a replica copy for failover purposes.
If you are using an external runtime database, the cluster does not provide failover. In this case, the
external database server is responsible for ensuring high availability.
Configuration and geolocation databases
The primary master is the only master on which you can update the configuration and geolocation
databases. The other nodes in the cluster, including secondary, tertiary, and quaternary masters,
maintain a read-only copy of the information from these databases.
Failover in a cluster
The distributed session cache, internal runtime database, geolocation database, and configuration
database have varying failover capabilities in a clustered environment.
If you configure a secondary master and the primary master fails, the distributed session cache and
the internal runtime database failover to the secondary master. When the primary master is restored,
For more information, see 'use-new-stateful-on-error' under the [junction] stanza in "Web Reverse Proxy
stanza reference topics".
170 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
You can configure the cluster to replicate the runtime settings and certificate database settings on the
Replication tab of the Cluster Configuration page. For more information about these settings, see the
"Replicate settings across the cluster" details in “Managing cluster configuration ” on page 70.
When you enable replication of the runtime settings, the policy server configuration and policy database
information is copied from the primary master to every node in the cluster. The keys that are used for
SSL communication between the Security Verify Access servers are also distributed across the cluster. If
these settings are changed, the primary master sends the updates to the other nodes in the cluster.
The following process occurs when you enable replication of the runtime settings from the local
management interface of the primary master:
• Any policy servers on other nodes in the cluster are stopped.
• The policy server configuration and policy database information is copied from the primary master to all
other nodes in the cluster. Any existing policy server configuration on these nodes is overwritten by the
configuration from the primary master.
• SSL keys for communication between the Security Verify Access servers are copied to every node.
• LDAP servers on other nodes in the cluster are stopped.
• If the Policy Server is configured to use a local LDAP, the LDAP data is copied to every node in the
cluster and LDAP is started on each node.
Note: If there are WebSEAL instances or authorization servers, which are configured against a different
policy server, you must reconfigure them to use the policy server on the primary master.
If you are using an external directory server with SSL enabled, you must configure the cluster to
replicate the certificate database settings. If you enable this replication setting, the key files for SSL
communication with the external directory server are distributed across the cluster.
If the primary master fails, you can promote any other node in the cluster to be the new primary master.
The policy server starts automatically on the new primary master. All of the Security Verify Access servers
on the other nodes are automatically reconfigured to use the policy server on the new primary master. The
Security Verify Access servers can connect to the new policy server without requiring a restart. For more
information about promoting a node to primary master, see “Promoting a node to primary master when
the original primary master is unavailable” on page 173.
When a node is promoted to primary master and replication for the runtime settings is enabled, the
following process occurs:
• The replicated policy server configuration is modified to listen on one of the Management Interfaces.
• The policy server is started on the promoted node.
• If the Policy Server is configured to use a local LDAP, the local LDAP is started on the promoted node.
• Any configured WebSEAL and authorization servers on nodes in the cluster are modified to point to the
policy server on the new primary master.
When you disable replication of the runtime settings, the policy server configuration and policy database
information is removed from the other nodes in the cluster. If you are using the local LDAP on the primary
master, the replicated copies of the LDAP files are removed from the other nodes. The WebSEAL instances
and authorization servers in the cluster continue to use the policy server on the primary master.
Note: After you disable the replication, restart the Security Verify Access server on each node in the
cluster.
If the policy server is configured with a local LDAP server as the user registry, high availability is provided.
Each node of the cluster contains a read-only replica of the LDAP server that is used automatically in
failover scenarios.
If the LDAP server provided by the primary master becomes unavailable to a node, any authorization
servers that run on that node will failover to their local replicas. During this time, only read operations
are possible. When the primary master LDAP server becomes available again, the node will automatically
revert to normal operation.
172 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Promoting a node to a supplementary master
Procedure
You can use the local management interface of the primary master to update the cluster configuration
and select the supplementary masters. To promote a node to secondary, tertiary, or quaternary master,
complete these steps:
1. Open the Cluster Configuration page from the primary master local management interface.
2. Go to the General tab.
3. Change the values in the master fields. That is, Secondary master, Tertiary master, Quaternary
master.
4. Save and deploy the updates.
Procedure
Use the local management interface of the appliance that you are promoting to primary master to update
the configuration. You can promote a non-master node or one of the supplementary masters if available.
To promote the selected node to primary master, complete these steps:
1. Access the local management interface of the node that you want to promote to primary master.
2. Select System > Network Settings > Cluster Configuration.
3. Select the General tab.
4. Select Set this appliance as a Primary Master.
5. Use the available menu to set the Primary master IP address. Select the first management interface of
the appliance.
6. Save and deploy the changes.
Procedure
Use the local management interface of the current primary master to update the configuration.
1. Access the local management interface of the current primary master.
2. Select System > Network Settings > Cluster Configuration.
3. Select the General tab.
4. Select a new primary master from the list of nodes in the drop-down list.
5. If applicable, update the rest of the configuration to ensure that you do not break any of the clustering
rules.
6. Save and deploy the changes.
Procedure
To remove the failed node from the cluster, complete the following steps in the local management
interface of the new primary master:
1. Go to the Overview tab on the Cluster Configuration page.
2. Under the Nodes section, select the node to remove.
3. Click Delete.
4. Select the Force check box to force the removal of the node even if the node cannot be reached.
5. Click Yes to confirm the operation.
6. Deploy the changes.
After you remove the failed node from the cluster, you might want to restart it and ultimately restore it as
a cluster member. In this case, you must complete some additional steps. While the node is disconnected
from the network, change it to a stand-alone cluster with only a single node, as described in the following
steps.
7. Restore the node and use its local management interface to access the Cluster Configuration page.
8. Go to General tab.
9. From the overview page, remove all other nodes.
10. Change the Primary master IP address to 127.0.0.1.
11. Save and deploy the change.
12. Troubleshoot the original failure and resolve any problems.
You can now join the restored appliance back in to the original cluster. This process joins the restored
node to the cluster as a non-master node:
13. In the local management interface of the restored appliance, go to the Overview tab on the Cluster
Configuration page.
174 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
14. Click Import.
15. In the Join Cluster window, click Browse to select the cluster signature file of the new primary
master.
Note: You can generate the cluster signature file by using the local management interface of the new
primary master and selecting the Export option in the Overview tab.
16. Click Join to add the current appliance to the cluster.
17. Deploy the changes.
Procedure
Select the steps for the task you want to complete:
• Configuring a restricted node during registration
Configure a restricted node when you register the node by using the local management interface.
a. Register a node to a cluster.
For more information, see Managing cluster configuration.
b. Check Join as restricted node in the Join Cluster window.
c. Click Join to add the appliance to a cluster as a restricted node.
• Configure a restricted node in a cluster
Use the local management interface to specify a restricted node in a cluster.
a. Log on to the master appliance.
b. From the top menu of the local management interface, select System > Cluster Configuration.
c. Select the Overview tab.
d. Select the node to be set as restricted in the Nodes grid.
e. Click Restricted Node.
f. Click Submit.
Back up procedures
In a clustered environment, you cannot use VMWare snapshots to back up your virtual machines. For
reliable backups, use appliance snapshots to back up the cluster.
You can complete an appliance snapshot on each cluster member to effectively back up the cluster. An
appliance snapshot of the primary master includes all of the cluster configuration and runtime data. When
the primary master is restored from an appliance snapshot, it updates every cluster member with the
restored configuration.
An appliance snapshot of a node other than the primary master excludes the runtime database
information. When a cluster member is restored from a snapshot, it contacts the primary master to obtain
up-to-date configuration and runtime information.
To effectively back up the cluster, complete an appliance snapshot of the primary master after any change
to the cluster configuration. For example, take a snapshot after you add or remove a node to ensure that
the correct nodes are included in the cluster after a restore.
176 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• You cannot specify a master without first specifying each of the prior masters. For example, you must
specify the secondary master before you can specify a tertiary master.
• If you specify a secondary master, you must also specify the master external reference entity (ERE).
• You can modify the cluster policy on the primary master only, unless you are promoting a local node to
primary master in a disaster recovery situation.
Cluster registration
Before you register or unregister a node in a cluster, consider these registration rules.
• You must activate your products on the primary master before you activate the product on any other
nodes.
If you are using the internal runtime database in a cluster, you must also activate the product on the
secondary master before the other nodes.
For more information about the activation process, see Activating the product and buying support.
Cluster ports
When you configure an appliance cluster, you are required to specify the starting port number for a range
of ports to be dedicated to the services that are provided by the cluster.
It is important to note that these ports are for internal use only and are not used by the cluster for
communication between nodes. All of the communication that takes place between nodes in the cluster
occurs over port 22. This means that if your nodes are separated by a firewall, you only need to open up
traffic on port 22 to allow the cluster services of the various nodes to communicate with each other.
The following diagram illustrates the communication requirements of the various roles in the cluster.
If you want to manually configure a DSC client on a node within the cluster, use the following addresses
and ports:
Note: The following examples assume that the first port is 2020.
Some additional settings are required to configure a DSC client on a node within the cluster. Set the
priority for each distributed session cache server to 9 within the server stanza entry in the [dsess-
cluster] stanza. Also set the load-balance stanza entry in the [dsess-cluster] stanza to no.
The DSC does not support load balancing. Setting the load-balance configuration entry to no prevents
connection attempts to servers for which the connection attempts will certainly fail.
178 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Internal runtime database
• An appliance that is operating as a single node cluster fails. In this situation, there is no recovery
possible.
• The primary master fails, and no secondary master is configured.
• The maximum size of the internal runtime database is adjusted such that the new maximum size is
smaller than the existing database.
Deployment pattern
Read this section to understand the components of a typical cluster environment and how to set up such
environments. In this typical deployment scenario, the cluster incorporates both a Security Verify Access
base appliance and an appliance with Advanced Access Control activated.
The following diagram illustrates a sample cluster environment.
180 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
In a traditional clustered deployment, the configuration is automatically synchronized by Verify Access
between multiple appliances and can only be modified on the primary node of the cluster. Whereas in a
cluster-less deployment it is the responsibility of the administrator of the environment to ensure that each
appliance has an identical configuration using alternative mechanisms. In a containerized deployments
(See Docker Support), this is easy and configuration snapshots can be used to instantiate a replicated
instance (See Scenario - Replicated Services). For appliance deployments automation should be used
instead to configure each appliance identically.
In order to achieve the cluster-less configuration of AAC with a seamless failover, the AAC nodes must be
configured to exercise am external runtime database and distributed session cache.
Protocol Scenario
SAML20 Single Sign-On – Different Binding (Post, Artifact, Redirect)
SAML20 Single Sign-On – Different NameIdFormats Email, Persistent (HVDB and LDAP
data sources) and Transient
SAML20 NameIdManagement – Update and Terminate
SAML20 Single Logout – Different Bindings ( Post, Artifact, SOAP)
SAML20 Single Sign-On With AccessPolicy
182 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Protocol Scenario
SAML11 Single Sign-On – Different Binding (Post, Artifact)
SAML11 Invoking an STS chain from a mapping rule during an SSO flow.
WS-Federation Single Sign-On
WS-Federation Single Sign-On with one-time assertion use enforcement set to true.
Protocol Scenario
OAuth 2.0/OIDC AuthorizationCode, Implicit, and Hybrid flows with static client
OAuth 2.0/OIDC AuthorizationCode, Implicit, and Hybrid flows with dynamic client
OAuth 2.0/OIDC AuthorizationCode, Implicit, and Hybrid flows with different response types
and response modes
OAuth 2.0/OIDC AuthorizationCode, Implicit, and Hybrid flows with different token endpoint
authentication mechanisms such as Post, Basic, JWT and Client Certificate.
Limitations
Each Verify Access instance must have the following items configured identically to ensure consistent
behaviour.
• Reverse proxy authentication mechanisms
• Junctions
• Verify Access runtime configuration (including managed groups, ACLs, and POPs)
Table 27. WebSEAL features that the appliance does not support
Feature Description
Custom libraries, including CDAS and EAS The appliance does not support custom CDAS
modules. As a result, the appliance does not
support the following authentication mechanisms:
• IP address
• HTTP header
• Post password change
WebSEAL does not provide CDAS modules for
these mechanisms.
Note: The appliance does support the IBM Security
Identity Manager Password Synchronization Plug-
in. For more information, see the [itim] stanza
in the Stanza Reference topics in the Knowledge
Center.
Application Response Measurement (ARM) WebSEAL software includes support for ARM to
monitor transactions throughout the request and
response processing stream. The appliance does
not include ARM support.
Tivoli Common Directory Logging The Tivoli Common Directory Logging feature
stores all log files for IBM Security software
applications in a common file system directory. The
appliance does not support this common logging.
Logging for the appliance is managed through the
LMI.
Auditing to a pipe or CARS The appliance cannot send audit records directly
to a pipe or a CARS server. It can however, use an
intermediate Verify Access authorization server to
indirectly send audit records to the destinations.
Table 27. WebSEAL features that the appliance does not support (continued)
Feature Description
ARS (web service) The IBM Security Verify Access for Web ARS web
service can send request information to an external
ARS server for authorization. ARS is not available
on the appliance.
186 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 11. Migration
-c config-file
The name of the WebSEAL configuration file.
d dst-dir
The name of the destination directory. This directory must not exist on the file system.
-v
Display more status messages during the execution of the script.
For example, use the following script:
g. Review the files that are contained within the destination directory to ensure that all of the
necessary files are located.
• Manually create the directory structure and copy the files to those directories.
On the source WebSEAL server, create the directory structure of configuration files, as defined in the
following table. Only those directories for which files are to be migrated must be created. Create
these directories as subdirectories under a single source directory.
doc-root/docs The files that are served by the WebSEAL local junction. These files are
typically located under the /opt/pdweb/www-<instance>/lib/docs
directory.
doc-root/errors The error pages that are served by the WebSEAL instance. These files
are typically located under the /opt/pdweb/www-<instance>/lib/
errors directory.
doc-root/html The management HTML pages (for example, login.html) which are
served by the WebSEAL instance. These files are typically located under
the /opt/pdweb/www-<instance>/lib/html directory.
doc-root/oauth The OAuth response files, as defined within the [oauth-eas] stanza of
the WebSEAL configuration file.
junctions The XML files that contain the junction definitions for the WebSEAL
instance. These files are typically located under the /opt/pdweb/www-
<instance>/jct directory.
etc The configuration files that are used by the WebSEAL instance. In
particular, the routing file, the webseald-<instance>.conf, and the
webseald-<instance>.conf.obf files.
Note: When you create the directory structure, additional subdirectories are not supported for any
directory other than the doc-root ones (doc-root/docs, doc-root/errors, doc-root/html,
doc-root/oauth). For example, you can create a directory structure such as /doc-root/error/
<folder>/<file>, but a structure such as xslt/http-transformation/<folder>/<file> is
not valid. For directories other than the doc-root ones, files can be placed only in the default root
directories that are listed in Table 28 on page 188. For example, xslt/http-transformation/
<file>.
Note: All files to be copied must have unique file names. If two files have the same name, the
migration tool copies only the first file that matches the name. For example, you might have the
following structure:
188 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
[http-transformation]
request_pop1 = <path1>/pop1.xsl
response_pop1 = <path2>/pop1.xsl
Only <path1>/pop1.xsl are created in the directory structure. All references to <path1>/
pop1.xsl and <path2>/pop1.xsl in the configuration file are reduced to pop1.xsl, which now
points to the same file.
4. The WebSEAL configuration file must be included in the set of configuration files to be migrated. The
obfuscated configuration file, as defined by the [configuration-database] stanza and file
configuration entry, must also be included.
5. Modify the copied WebSEAL configuration file so that any configuration entries that are not applicable
to the new WebSEAL instance are removed. Examples of entries that you might potentially not want
to migrate would include network settings. The following configuration entries are ignored when the
configuration file is imported into the appliance:
• token-card configuration entry from the [authentication-levels] stanza
• server-name configuration entry from the [server] stanza
• network-interface configuration entry from the [server] stanza
• [interfaces] configuration stanza
6. Create a compressed file, with the contents relative to the location that contains the copied files. For
example, on a UNIX system, if the directory structure was created in /tmp/migrate, the command
would be:
Procedure
1. Create a WebSEAL instance on the appliance with the local management interface.
2. Import the migration compressed file.
Note:
• If you are warned that files might be overwritten as a part of the import operation, you must validate
the overwrite operation before you can continue. Make sure that the overwrite operation does not
affect any other WebSEAL instances that might be running on the appliance. For detailed steps when
you import with the local management interface, see Import the contents of a compressed file into
the administration pages root.
• If the appliance is a non-primary node in a clustered environment, and you enabled replication
of SSL certificates in the cluster, first manually import the required SSL key files into the primary
node and wait for these certificates to be replicated to the non-primary node. After the replication
is complete, you can then import the WebSEAL configuration bundle into the non-primary node.
If you do not follow this procedure in this type of environment and instead import the WebSEAL
configuration directly on the non-primary node, the certificates from the WebSEAL configuration
compressed file might be replaced during the next replication event by the certificates from the
primary master and this will cause deployment issues.
• The import function audits the configuration file changes and logs the auditing details in the file
migrate_YYYYMMDDHHMM.log. To access this file, go to Monitor > Manage > Reverse Proxy Log
Files, select the instance from Reverse Proxy Instances, this log file is accessible under Log Files
for Selected Instance.
Procedure
1. In the appliance top menu, go to System > File Downloads.
2. Under common > migrate, select the isam_migrate.pl file to download it.
This file is a Perl utility to help facilitate the collection of files that are required by the migration.
3. Copy the isam_migrate.pl file to the existing Access Manager software environment.
4. Run the isam_migrate.pl script, specifying the location of the runtime environment and policy
server configuration path.
-c <config-path>
The path of the IBM Security Access Manager configuration files.
-d <working-dir>
The name of the working directory. This directory must not exist on the file system.
-o <zip-file>
The name of the configuration bundle .zip file to produce. This file must not exist on the file system.
-v
Display more status messages during the execution of the script.
The following script is an example:
Note: In most situations, the existing user registry is used by the migrated policy server. An exception
to this situation is the environment where Active Directory is used as the user registry. In this situation,
the Security Verify Access metadata must be migrated from the existing user registry to a new user
registry. The isam_migrate.pl utility also provides this capability.
To migrate from a Windows computer that runs the Security Access Manager policy server, that uses
Active Directory as the user registry, you can use the following commands:
190 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
-U
Unconfigure the old Active Directory policy server. This parameter is used to clean up the Security
Verify Access user data from the Active Directory server after the data is migrated.
-i
The user registry that is embedded in the appliance is used by the policy server. If this parameter is
not present, then the LDAP server is external to the destination appliance.
-h <ldap-host>
The host name of the user registry against which the policy server is configured. This option is not
required if the "-i" option is used.
-p <ldap-port>
The port of the user registry against which the policy server is configured. This option is not
required if the "-i" option is used.
-s
If this parameter is present, then SSL is used by the policy server when it is communicating with
the external user registry. This option is not required if the "-i" option is used.
-D <ldap-admin-dn>
The distinguished name of the administrator of the external user registry that is used. This option is
not required if the "-i" option is used.
-a <authority-suffix>
The LDAP suffix that is used to hold the Security Verify Access secAuthority data. This option is not
required if the "-i" option is used.
-w <ldap-pwd>
The password for the administrator of the external or internal user registry.
-b
Migrate the users as Security Verify Access basic users.
-k <keyfile>
A GSKit CMS keyfile that contains the Active Directory CA certificate. If the option "-i" was not
supplied and "-s" was supplied, then it must also contain the external LDAP server SSL CA
certificate.
-W <keyfile-pwd>
The password for the specified keyfile.
-f <usergroup-ldif-file>
The file that stores all non-system user and group metadata in LDIF format. This file must be
added after the policy server is migrated.
Note: This file is not used for the migration on the appliance. Do not include this file in the
<zip-file>.
• Generate a migration .zip file that can be used to configure a policy server on the appliance with the
embedded LDAP server.
• Generate a migration .zip file that can be used to configure a policy server on the appliance with an
external LDAP server.
• Unconfigure the Active Directory server. This command is used to clean up the Security Verify Access
user data from the Active Directory server after the data is migrated.
Note: Use this unconfigure command only after you finish generating the migration .zip file.
As an example, use the following set of assumptions:
– The user is logged in to the Active Directory machine that is running the policy server and has
administrative access to Active Directory and the local machine.
– Perl is installed into the directory C:\perl.
– The isam_migrate.pl file is in C:\.
– The current working directory is C:\.
192 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
The following command is based on the list of assumptions:
C:\perl\bin\perl.exe isam_migrate.pl -U -c
"C:\Program Files\Tivoli\Policy Director\etc"
5. If a compressed file is not automatically created on your platform, create a compressed file where the
contents are relative to the location that contains the copied files.
For example, on a UNIX system, if the directory structure was created in /tmp/isam, the command
would be:
6. In the destination appliance's local management console, import the compressed file created in the
previous step.
a) Go to Web > Manage > Runtime Component.
b) Click Configure.
c) Click Import.
d) In the pop-up window, click Browse.
e) Select the compressed file that contains the necessary migration files.
f) Click Import.
g) Deploy the changes.
Note:
• If you are migrating from an environment that uses a local LDAP server, you might need to
manually change the host values (localhost) in the pd.conf and ldap.conf files to IP
addresses that suit your new environment.
• The behavior of "[ssl] ssl-v3-enable" in pd.conf changed after version 6.1.1. It now
provides the default for all other Security Verify Access servers on the same machine, unless
their .conf file explicitly sets its value. Previously this option only affected the pdadmin
command. So if "[ssl] ssl-v3-enable = yes" is set in the migrated pd.conf, and is
not explicitly set in the migrated ivmgrd.conf file, then the policy server starts with SSLv3
enabled. To obtain the behavior before migration, add "[ssl] ssl-v3-enable = no" into the
ivmgrd.conf file. It would be better to not use SSLv3 at all and set "[ssl] ssl-v3-enable =
no" in the migrated pd.conf file.
What to do next
If you want to add the <usergroup-ldif-file> after migration, you must apply this file to the LDAP server
that is used by the new policy server by using an LDIF tool.
For example, use the following ldapadd command:
Web service
Deploy the pending configuration changes
URL
https://{appliance_hostname}/isam/pending_changes/deploy
Method
GET
Parameters
N/A
Response
HTTP response code and JSON error response where applicable.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/deploy
Response:
200 ok
Roll back the pending configuration changes
URL
https://{appliance_hostname}/isam/pending_changes/forget
Method
GET
Parameters
N/A
Response
HTTP response code and JSON error response where applicable.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/forget
Response:
200 ok
https://{appliance_hostname}/isam/pending_changes/count
Method
GET
Parameters
N/A
Response
HTTP response code and JSON data that represents the number of pending changes.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/count
Response:
{"count": 3}
https://{appliance_hostname}/isam/pending_changes
Method
GET
Parameters
N/A
196 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Response
HTTP response code and JSON data that represents the list of pending changes.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes
Response:
200 ok
[{
"id": 0,
"policy": "SSL Certificates",
"user": "admin",
"date": "2012-11-05T11:22:20+10:00"
}]
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
Information about the status and the mode of the runtime environment is displayed.
Note: If the runtime environment is configured as either local stand-alone or remote stand-alone
mode, you can stop, start, or restart it with this management page. Otherwise, the Stop, Start, and
Restart buttons are disabled.
2. Depending on your needs, choose to stop, start, or restart the runtime environment.
a) To stop the runtime environment, click Stop.
b) To start the runtime environment, click Start.
c) To restart the runtime environment, click Restart.
The records of these operations are logged to the policy server log files and user registry log files.
3. Optional: To manage the policy server and user registry log files, click the Go to Application Log Files
to view the Policy Server and User Registry log files link. You can also access these log files by
selecting Monitor > Application Log Files from the top menu.
Relevant entries can be found under isam_runtime/policy_server and isam_runtime/
user_registry.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Click Configure.
You can configure your policy server to be local or remote.
• Local policy server with a remote LDAP user registry
a. Under Policy Server, select Local.
b. Under User Registry, select LDAP Remote.
c. Under Common, check the check-box Restrict Management Interfaces if the local policy server
should listen only on the local interface. If the box is not checked, the policy server will listen on
all the available management interfaces.
d. Click Next.
e. On the Policy Server tab, provide settings for the fields displayed. Fields with an asterisk are
required and must be completed.
– Management Suffix: The LDAP suffix that is used to hold the IBM Security Verify Access
secAuthority data.
Note: To create the domain at the secAuthority=Default tree, you must leave this field
blank.
– Management Domain: The IBM Security Verify Access domain name.
Note: Make sure that the domain name you specify is unique among all domains on the LDAP
server. The existence of a domain with the same name in a different suffix also causes an
error. As this field is the name of the management domain, do not specify an LDAP DN.
Here are some example settings and the corresponding result data:
Setting Result
secAuthority=Default
Management Suffix: <blank>
Management Domain: Default
secAuthority=Default,OU=TAMDATA
Management Suffix: OU=TAMDATA
Management Domain: Default
200 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
– Administrator Password: The security administrator's password.
– Confirm Administrator Password: The security administrator's password.
– SSL Server Certificate Lifetime (days): The lifetime in days for the SSL server certificate.
– SSL Compliance: Specifies any additional SSL compliance.
f. Click Next.
g. On the LDAP tab, provide settings for the fields displayed. Fields with an asterisk are required
and must be completed.
Clean existing data
Select this check box to delete any existing data in the embedded LDAP server before the
configuration.
h. Click Finish to save the settings.
• Remote policy server
a. Under Policy Server, select Remote.
b. Under User Registry, select whether to use LDAP.
c. Click Next.
d. On the Policy Server tab, provide settings for the fields displayed.
– Host name: The name of the host that hosts the IBM Security Verify Access policy server.
– Port: The port over which communication with the IBM Security Verify Access policy server
takes place.
– Management Domain: The IBM Security Verify Access domain name.
e. Click Next and complete settings on the LDAP tab.
– Host name: The name of the LDAP server.
– Port: The port to be used when the system communicates with the LDAP server.
f. Click Finish to save the settings.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Click Unconfigure.
3. Take one of the following sets of actions.
• Unconfigure a local policy server with a remote LDAP user registry
a. Enter the LDAP DN and LDAP password.
b. Select the Clear user registry entries check box if you want the unconfigure operation to
remove all Security Verify Access domain, user, and group information. By default, this check
box is not selected.
c. Click the Force check box if you want the unconfigure operation to forcefully remove all of the
configuration data. By default, this check box is not selected.
Note: Select the Force check box only if the unconfiguration fails repeatedly. Use this option
only as a last resort.
d. Click Submit to confirm the operation.
• Unconfigure a local policy server with a local user registry
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Click Manage > Configuration Files.
3. Select one of the following runtime configuration files.
pd.conf
ivmgrd.conf
ldap.conf
activedir_ldap.conf
Routing File
Note: The ivmgrd.conf and Routing File options are only available when a policy server is configured
on the appliance.
4. Edit the configuration file and then click Save to save the changes. If you do not want to save the
changes, click Cancel. If you want to revert to the previous version of the configuration file, click
Revert.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 39.
Procedure
1. From the top menu, select System > System Settings > Advanced Tuning Parameters.
2. Click New.
3. In the Key field, enter runtime_profile.jvm_option.
4. In the Value field, enter the JVM debug options that suits your environment. For example, -Xdebug
-Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=1044.
5. Click Save Configuration.
6. Deploy your changes.
202 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Exporting the runtime environment configuration
Export the configuration bundle of the runtime environment from the appliance to migrate the policy
server and runtime to a different appliance. The exported configuration bundle can be imported into an
appliance when you are configuring the runtime environment.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select Manage > Configuration Files > Export Configuration.
3. Confirm the save operation when your browser displays a confirmation window.
What to do next
After the runtime environment is migrated to a new appliance, the configuration on dependent appliances
(for example an appliance that runs a WebSEAL server) must be manually updated. To refer to the
appliance that is running the migrated runtime environment, update the following configuration entries:
Procedure
1. Log in the local management interface.
2. From the top menu, select Web > Manage > Runtime Component.
3. Click Manage > Configuration Files.
4. Select ldap.conf.
5. Add the following lines under the [ldap] stanza.
basic-user-support = yes
Set this option to yes to support basic users.
basic-user-principal-attribute = <uid>
This attribute is the principalName of the basic and full users.
basic-user-search-suffix = <DN>
Set this option for each suffix to search for full and basic users. This must include suffixes to search
on the primary LDAP server and all federated registries.
If basic-user-support is enabled and one or more basic-user-search-suffix values
are configured, the ignore-suffix entries are disregarded. The basic-user-search-suffix
configuration entries determine the suffixes that are searched.
Note: When there are no basic-user-search-suffix entries, the system searches all available
suffixes, except for those specified by the ignore-suffix entries. If you do not specify any
basic-user-search-suffix values, you can use ignore-suffix entries to specify one or
more suffixes to exclude from the search.
If basic-user-search-suffix is not set, then all suffixes are chosen in an unspecified order.
If you choose to specify one or more basic-user-search-suffix entries, ensure that you
include an entry for every suffix that must be searched. Ensure that you include the primary suffix
for Security Verify Access accounts. For example, secAuthority=Default. If you specify one or
more basic-user-search-suffix entries, but you do not include this suffix, the search does
not return the full Security Verify Access accounts. In this case, you are not able to authenticate to
pdadmin with the sec_master account or any other Security Verify Access accounts.
basic-user-no-duplicates = {yes | no}
If set to yes, the search for basic users covers all suffixes to ensure that no users with the same
name are found. If set to no, the search for basic users stops immediately and ignores possible
duplicates.
Avoid configuring your environment to include suffixes that contain duplicates. Ensure that the
basic-user-principal-attribute is unique for all accounts across the specified suffixes. If
there are no duplicates in the environment, you can set basic-user-no-duplicates to no to
improve search efficiency. However, if duplicates exist in your environment, set basic-user-no-
duplicates to yes so that the system can return an error if it encounters more than one account
with the same principal attribute value.
basic-user-suffix-optimizer = {yes | no}
If set to yes and basic-user-no-duplicates is set to no, the search order of suffixes is sorted,
with the most hit of the basic user suffix at the head of the search suffix list. If set to no, the search
order is provided by the basic-user-search-suffix order.
Note: If basic-user-no-duplicates is set to yes, the basic-user-suffix-optimizer
entry is disregarded. In this case, all suffixes are searched to check for duplicates.
basic-user-principal-attribute = <uid>
7. Click Save.
Note: For the changes to take effect, they must be deployed as described in Configuration changes
commit process.
206 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Embedded LDAP server management
When you configure the Security Verify Access runtime environment, you can choose to use an external
user registry for storing the Security Verify Access metadata, or use the embedded user registry.
This same registry can optionally be used to also store the associated user data for the users. For more
information, see “Managing federated directories” on page 209.
By default, the contents of the embedded user registry are not included in snapshot files.
To include the user registry data from the embedded user registry in snapshot files, set the
wga_rte.embedded.ldap.include.in.snapshot advanced tuning parameter to true.
SSL support
The embedded LDAP server provides an SSL interface for management of the data contained in the user
registry.
The embedded LDAP server listens on port 636 of the management interface of the appliance by default.
The administrator can choose a port other than the default by modifying the advanced tuning parameter
wga.rte.embedded.ldap.ssl.port. The advanced tuning parameters are accessed through System
> Advanced Tuning Parameters. After you modify this advanced tuning parameter, you must restart the
Security Verify Access runtime environment for the change to take effect.
The SSL certificates that are used by the LDAP server can be managed through the SSL Certificates
panels of the LMI. For further details, see “Managing SSL certificates” on page 111. The certificates are
contained in the embedded_ldap_keys database file.
Two certificates are used by the LDAP server:
1. The certificate with the server label is used as the server certificate by the LDAP server. By default, the
server certificate is a self-signed certificate. But this should be replaced in a production environment.
2. The certificate with the ca label is used as the CA certificate by the LDAP server. If no ca certificate is
found in the key database, the server then uses the server certificate as the CA certificate. That is, it
expects the server certificate to be a self-signed certificate.
In addition to this, the LDAP server can support mutual authentication by client certificates, providing
that:
1. The client certificate has been signed by the CA that is known to the LDAP server. That is, the CA
certificate is stored in the keyfile with a label of ca.
2. The distinguished name (DN) contained in the client certificate precisely matches a known LDAP user.
The FIPS setting of the appliance controls the ciphers that are supported by the OpenLDAP server.
Managing passwords
Administration of the data contained in the embedded LDAP server can be performed as the
cn=root,secAuthority=Default user.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select Manage > Embedded LDAP > Password.
3. Enter the new password in the Password field.
4. Enter the new password again in the Confirm Password field.
5. Click OK to change the password.
o=My Company
o=My Company,c=US
ou=Widget Division,o=My Company,c=US
Where ou is the name for the organizationalUnit object class, o is the organization name for the
organization object class, and c is a standard two letter country abbreviation used to name the
country object class.
The following table lists the supported suffix elements and the corresponding object classes that are used
when creating the top level entry for the suffix:
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select Manage > Embedded LDAP > Suffixes.
All current suffixes are listed. You can then add or delete suffixes as needed.
3. Follow the prompts to complete the action you want to take.
Procedure
1. Select Web > Manage > Runtime Component.
2. On the Runtime Component page, select Manage > Embedded LDAP > Change Debug Level.
208 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
3. Select or clear the check boxes to indicate the wanted debug level. You can select zero to multiple
debug level options.
Tip: Use the check box at the top to select or clear all debug level options.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select Manage > Federated Directories.
210 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 15. Reverse proxy instance management
In the local management interface, go to Web > Manage > Reverse Proxy. A list of all instances and their
current states is displayed.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. You can select single or multiple instances.
Stop an instance
a. Select the instance(s) of interest.
b. Click Stop.
c. A message is displayed indicating that the instance has been stopped successfully.
Start an instance
a. Select the instance(s) of interest.
b. Click Start.
c. A message is displayed indicating that the instance has been started successfully.
Restart an instance
a. Select the instance(s) of interest.
b. Click Restart.
c. A message is displayed indicating that the instance has been restarted successfully.
3. To operate on all instances do not select any instances:
Stop all instances
Ensure that no instances are selected.
a. Click Stop All.
b. A message is displayed indicating that the instances are stopped successfully.
Start all instances
Ensure that no instances are selected.
a. Click Start All.
b. A message is displayed indicating that the instances are started successfully.
Restart all instances
Ensure that no instances are selected.
a. Click Restart All.
b. A message is displayed indicating that the instances are restarted successfully.
Configuring an instance
To configure an instance with the local management interface, use the Reverse Proxy management page.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Click New.
3. Provide settings for the fields that are displayed on the Instance, IBM Security Verify Access,
Transport, and User Registry tabs.
• On the Instance tab:
Field Description
Instance Name This is the new instance name, which is a unique name that identifies the
instance. Multiple instances can be installed on the same computer system.
Each instance must have a unique name.
Host Name The host name that is used by the IBM Security Verify Access policy server to
contact the appliance. The address that corresponds to this host name must
match a management interface address of the appliance. The addresses that
are associated with the application interface of the appliance cannot be used
for communication with the IBM Security Verify Access policy server.
Valid values include any valid host name or IP address. For example:
libra.dallas.ibm.com
Listening Port This is the listening port through which the instance communicates with the
Security Verify Access policy server.
IP Address for The IP address for the logical interface.
the Primary
Interface
• On the IBM Security Verify Access tab:
Field Description
Administrator The Security Verify Access administrator name.
Name
Administrator The Security Verify Access administrator password.
Password
Domain The Security Verify Access domain.
• On the Transport tab:
Field Description
Enable HTTP Specifies whether to accept user requests across the HTTP protocol.
HTTP Port The port to listen for HTTP requests. This field is only valid if the Enable HTTP
check box is selected.
Enable HTTPS Specifies whether to accept user requests across the HTTPS protocol.
HTTPS Port The port to listen for HTTPS requests. This field is only valid if the Enable
HTTPS check box is selected.
• On the User Registry tab:
212 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Field Description
Enable SSL Specifies whether to enable SSL communication between the instance and the
LDAP server.
Key File Name The file that contains the LDAP SSL certificate. This field is only valid if the
Enable SSL check box is selected.
Certificate Label The LDAP client certificate label. This field is only valid if the Enable SSL check
box is selected.
Port The port number through which to communicate with the LDAP server. This field
is only valid if the Enable SSL check box is selected.
4. Click Finish.
A message is displayed indicating that the instance has been configured successfully.
Unconfiguring an instance
To unconfigure an instance with the local management interface, use the Reverse Proxy management
page.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance to unconfigure.
3. Click Delete.
4. Enter the administrator name and password.
5. Click Delete
Note: Select the Force check box if unconfiguration fails multiple times. Use this option only as a last
resort.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Edit.
4. Make your changes to the settings on the Server, SSL, Junction, Authentication, SSO, Session,
Response, Logging, and Interfaces tabs.
Server
The Server tab contains entries that are related to the general server configuration.
Field Description
HTTPS Select this check box to enable the HTTPS port within Reverse Proxy.
HTTPS Port The port over which Reverse Proxy listens for HTTPS requests.
Enable HTTPS Select this check box to enable proxy protocol support for incoming
Proxy Protocol connections on the primary interface over HTTPS.
HTTP Select this check box to enable the HTTP port within Reverse Proxy.
HTTP Port The port over which Reverse Proxy listens for HTTP requests.
SSL
The SSL tab contains entries that are related to the general SSL configuration of the server.
Field Description
SSL Certificate Key File The key database that is used to store the certificates
which are presented by Reverse Proxy to the client.
Network HSM Key File The key database that stores the certificates to be used by
the network Hardware Security Module (HSM) device.
SSL Server Certificate The name of the SSL certificate, within the key database,
which is presented to the client. The drop-down list
includes certificates from both the local and network key
files. The certificates from the network key file are prefixed
with the token label for the network HSM device.
JCT Certificate Key File The key database that is used to store the certificates
which are presented by Reverse Proxy to the junctioned
Web servers.
Junction
The Junction tab contains entries that are related to the general junction configuration.
Field Description
HTTP Timeout Timeout in seconds for sending to and reading from a TCP
junction.
HTTPS Timeout Timeout in seconds for sending to and reading from an SSL
junction.
Ping Interval The interval in seconds between requests which are sent by
Reverse Proxy to junctioned Web servers to determine the
state of the junctioned Web server.
Ping Method The HTTP method that Reverse Proxy uses when it sends
health check requests to the junctioned Web server.
214 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Field Description
Ping URI The URI that Reverse Proxy uses when it sends health check
requests to the junctioned Web server.
Maximum Cached Persistent The maximum number of connections between Reverse
Connections Proxy and a junctioned Web server that will be cached for
future use.
Persistent Connection Timeout The maximum length of time, in seconds, that a cached
connection with a junctioned Web server can remain idle
before it is closed by Reverse Proxy.
Managed Cookie List A pattern-matched and comma-separated list of cookie
names for those cookies which are stored in the Reverse
Proxy cookie jar. Other cookies are passed by Reverse Proxy
back to the client.
Authentication
The Authentication tab contains entries that are related to the configuration of the authentication
mechanisms which are used by the server.
Basic Authentication
Field Description
Transport The transport over which basic authentication is supported.
Realm Name Realm name for basic authentication.
Forms Authentication
Field Description
Forms Authentication The transport over which forms authentication is supported.
Field Description
Accept Client Certificates Defines the condition under which client certificates are
required by Reverse Proxy.
Certificate EAI URI The resource identifier of the application that is invoked to
perform external client certificate authentication.
Certificate Data The client certificate data that are passed to the EAI
application.
Kerberos Authentication
Field Description
Transport The transport over which Kerberos authentication is
supported.
Keytab File Name of the Kerberos keytab file. The keytab file must
contain each of the service principal names used for
SPNEGO authentication.
Kerberos Service Names The list of Kerberos service principal names used for the
server.
The first service name in the list is the default service
name. To make a service name the default, select the
service name and then click Default.
EAI Authentication
Field Description
Transport The transport over which EAI authentication is
supported.
Trigger URL A URL pattern that is used by Reverse Proxy to determine
whether a response is examined for EAI authentication
headers.
Authentication Levels The designated authentication level for each of the
configuration authentication mechanisms.
Token Authentication
Field Description
Transport The transport over which RSA authentication is
supported.
You can also click Go to RSA Configuration to access the RSA Configuration page.
OIDC Authentication
Field Description
Transport Specifies the transport for which
authentication using the OIDC authentication
mechanism is enabled.
Redirect URI The redirect URI which has been registered
with the OIDC OP. The redirect URI should
correspond to the /pkmsoidc resource of
the WebSEAL server (for example: https://
isva.ibm.com/pkmsoidc). If no redirect
URI is configured it will be automatically
constructed from the host header of the
request.
Discovery Endpoint The discovery end-point for the OP. The
CA certificate for the discovery-endpoint
and corresponding authorization and token
endpoints must be added to the WebSEAL
key database.
216 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Field Description
Proxy URL The URL of the proxy which will be used when
communicating with the OP.
Client Id The Security Verify Access client identity, as
registered with the OP.
Client Secret The Security Verify Access client secret, as
registered with the OP.
Response Type The required response type for authentication
responses. The possible values are:
code
The authorization code flow will be used
to retrieve both an access token and
identity token.
id_token
The implicit flow will be used to retrieve
the identity token.
id_token token
The implicit flow will be used to retrieve
both an access token and identity token.
Click the Load Key button to load the SSL key for the discovery URI into the WebSEAL key file.
This will be achieved by retrieving the root certificate from the server. If the CA certificate is
not provided by the server it should be loaded manually into the WebSEAL SSL key file. This
operation is not supported when a proxy is configured. In this environment the key should be
loaded manually into the SSL key file.
Click the Test Endpoint button to see whether the endpoint can be successfully accessed by
WebSEAL and that it returns the expected OIDC meta-data.
Session
The Session tab contains entries that are related to the general session configuration.
Field Description
Re-authentication for Inactive Whether to prompt users to re-authenticate if their entry
in the server credential cache has timed out because of
inactivity.
Max Cache Entries The maximum number of concurrent entries in the session
cache.
Lifetime Timeout Maximum lifetime in seconds for an entry in the session
cache.
Inactivity Timeout The maximum time, in seconds, that a session can remain
idle before it is removed from the session cache.
TCP Session Cookie Name The name of the cookie to be used to hold the HTTP
session identifier.
SSL Session Cookie Name The name of the cookie to be used to hold HTTPS session
identifier.
Use Same Session Select the check box to use the same session for both
HTTP and HTTPS requests.
Session Cache
Field Description
Enable Distributed Sessions Select the check box to enable distributed
sessions on this reverse proxy instance.
218 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Field Description
Response
The Response tab contains entries that are related to response generation.
Field Description
Enable HTML Redirect Select the check box to enable the HTML redirect function.
Enable Local Response Redirect Select the check box to enable the local response redirect
function.
Local Response Redirect URI When local response redirect is enabled, this field contains
the URI to which the client is redirected for Reverse Proxy
responses.
Local Response Redirect Macros The macro information which is included in the local
response redirect.
SSO
The SSO tab contains entries that are related to the configuration of the different single-sign-on
mechanisms that are used by the server.
Failover
Field Description
Transport The transport over which failover authentication is supported.
Cookies Lifetime Maximum lifetime in seconds for failover cookies.
Cookies Key File The key file which is used to encrypt the failover cookie.
LTPA
Field Description
Transport The transport over which LTPA authentication is supported.
Cookie Name The name of the cookie which is used to transport the LTPA
token.
Key File The key file that is used when accessing LTPA cookies.
Key File Password The password that is used to access the LTPA key file.
Field Description
Enable Agent Logging Select the check box to enable the agent log.
Enable Referer Logging Select the check box to enable the referrer log.
Enable Request Logging Select the check box to enable the request log.
Request Log Format The format of the entries that are contained within the request log.
Maximum Log Size The maximum size of the log file before it is rolled over.
Flush Time The period, in seconds, that Reverse Proxy caches the log entries
before the system writes the entries to the log file.
Enable Audit Log Select the check box to enable the generation of audit events.
Audit Log Type Select the events to be audited.
Audit Log Size The maximum size of the audit log file before it is rolled over.
Audit Log Flush The period, in seconds, that Reverse Proxy caches the audit log
entries before the system writes the entries to the log file.
Interfaces
The Interfaces tab contains settings that are related to WebSEAL secondary interfaces.
• To add a new secondary interface, click New. Then, define your settings in the pop-up window
that contains the following fields:
Field Description
Application Interface IP Address The IP address on which the WebSEAL
instance listens for requests.
HTTP Port This field contains the port on which the
WebSEAL instance listens for HTTP requests.
Enable HTTP Proxy Protocol Select this check box to enable proxy protocol
support for incoming connections to the
interface over HTTP.
HTTPS Port This field contains the port on which the
WebSEAL instance listens for HTTPS requests.
Enable HTTPS Proxy Protocol Select this check box to enable proxy protocol
support for incoming connections to the
interface over HTTPS.
Web HTTP Port This is the port that the client perceives
WebSEAL to be using.
Web HTTP Protocol This is the protocol that the client perceives
WebSEAL to be using.
Certificate Label The label of the SSL server certificate that
is presented to the client by the WebSEAL
instance.
Accept Client Certificates Defines the condition under which client
certificates are required by WebSEAL.
220 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Field Description
Worker Threads The number of threads that is allocated to
service requests.
HTTP/2 Enables HTTP/2 connection.
HTTP/2 Maximum Connections The maximum number of HTTP/2 connections
allowed per specified port.
HTTP/2 Header Table Size The size of HTTP/2 header table.
HTTP/2 Maximum Concurrent Streams The maximum concurrent HTTP/2 streams
allowed.
HTTP/2 Initial Window Size The initial window size of HTTP/2 connections.
HTTP/2 Maximum Frame Size The maximum frame size of HTTP/2
connections.
HTTP/2 Maximum Header List Size The maximum header list size of HTTP/2
connections.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Manage > Configuration > Edit Configuration File.
4. Edit the configuration file that is displayed and then click Save to save the changes. If you do not want
to save the changes, click Cancel. If you want to revert to the previous version of the configuration file,
click Revert.
Tip: When you are editing the configuration file, you can use the search function of the browser to
locate a string. For example, press Ctrl+F.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 39.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Manage > Configuration > Export Configuration.
A window opens displaying the wizard.
4. Click Next to view the Junctions tab
5. Select the junction to be exported.
Each junction will be defined in a separate YAML document named
resource_server_[junction_name].yaml within the exported configuration bundle.
6. Click Next to view the Features tab.
7. Select the additional features to be exported.
These items can be found within server.yaml and policies.yaml within the exported
configuration bundle.
8. Click Next to view the Validate tab.
9. Review the following warnings and the requested export data. These warnings are also available in
the ’export_trace.log’ file within the downloadable export archive.
10. Click Next to view the Download tab.
11. Click Export to IAG to download the exported configuration.
Scope of Export
IBM Application Gateway provides a subset of the capabilities included in the Verify Access
Reverse Proxy. Note that exported junctions are limited to the capabilities provided by IBM
Application Gateway. Capabilities which cannot be exported are reported on the Validation tab
and within the file "export_trace.log" in the generated zip file.
Additional manual steps are required after exporting before the configuration can be used
with IBM Application Gateway. For more information, see the IBM Application Gateway
documentation.
222 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Configuring Web Application Firewall
To configure the Web Application Firewall configuration file with the local management interface, use the
Reverse Proxy management page.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
• Edit the web application firewall configuration
a. Click Manage > Configuration > Edit WAF Configuration File.
b. Modify the content of the file.
c. Click Save.
Note: The web application firewall loads the appliance-wide rules in addition to this configuration
file. See Web application firewall configuration steps for more information.
• View the web application firewall logging data
a. Click Manage > Logging. The Manage Reverse Proxy Log Files window will be displayed.
b. The log file msg__waf.log contains the Web Application Firewall logging data.
Note: When enabled, the auditing and debug logs are sent to waf_audit.log and
waf_debug.log in the same location. Use this same procedure to view these logs.
Note: Refer to Logging and auditing for information about enabling Web Application Firewall
logging and auditing.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the Reverse Proxy instance to configure web application firewall for.
3. Click Manage > Configuration > Web Content Protection.
4. On the Operating Configuration tab, you can configure general Web Content Protection settings.
a) Select the Enable Web Content Protection check box to turn on the web application firewall.
b) To run the firewall in a simulation mode without actually affecting the client traffic, select the
Enable Simulation Mode check box. When the simulation mode is enabled, any detected issues
are audited and then ignored. You can preview the issues that are detected and adjust the settings
if necessary before any real actions are taken against the offending requests.
c) Select the Use Proxy HTTP Header check box as needed.
This is used to control whether the audit log contains the IP address of the client as obtained from
the network connection, or the IP address that is obtained from the x-forwarded-for HTTP header.
This setting is useful when a network terminating firewall sits between the reverse proxy and the
client.
d) Provide a value in bytes for the Maximum Memory Size field. This defines the maximum memory
that can be used by the PAM engine.
Note: PAM has a pre-defined minimum memory size. If the configured value is set to less than the
minimum, the allocated memory is automatically increased to this minimum size.
e) Under Resource Actions:
Note: Use this table to customize the actions that are taken when issues are encountered for a
particular resource. This is a pattern-matched list that is searched in order. The resource name can
contain the "*" and "?" pattern-matching characters. If no matching resource is found, the default
actions, as recommended by the x-force team, are taken.
• To add a resource:
i) Click New.
ii) On the Add Custom Resource page, provide the resource name. All issues available to the
resource are pre-populated.
Note: Resource names can contain the "*" and "?" pattern-matching characters. For example,
*.html.
iii) Select an issue that you want to modify and then click Edit.
iv) On the Edit Custom Resource Issue page, select the action to take against this issue in the
Response field.
v) Optional: If Quarantine is selected as the event response in the previous step, specify the
quarantine time in the Quarantine Period field.
224 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
vi) Click Save on the Edit Custom Resource Issue page.
vii) Click Save on the Add Custom Resource page.
• To edit a resource:
i) Select the resource name to edit.
ii) Click Edit.
iii) On the Edit Custom Resource page, select the issue that you want to modify and then click
Edit.
iv) On the Edit Custom Resource Issue page, modify the event response and quarantine time as
needed.
v) Click Save on the Edit Custom Resource Issue page.
vi) Click Save on the Edit Custom Resource page.
• To delete a resource:
i) Select the resource name to delete.
ii) Click Delete.
Note: There is no confirmation window for this delete operation. Make sure that the selected
resource is the one you want to delete before you click Delete.
f) Under Registered Resources:
Note: The registered resources are used to designate the requests that are passed to the
inspection engine. When a request is received by the Web reverse proxy, the entries in the list
is sequentially searched until a match is found. The action that is assigned to the matching resource
controls whether the inspection is enabled or disabled. The resources can contain wildcard
characters for pattern matching.
• To add a registered resource:
i) Click New.
ii) On the Add Protected Resources page that pops up, provide the Resource Name. For example,
index.html, *.html or *.gif.
iii) Select Enabled or Disabled as needed.
iv) Click Save.
• To edit a registered resource:
i) Select the resource to edit from the list.
ii) Click Edit.
iii) On the Edit Protected Resources page that pops up, modify the resource name and whether it
is enabled as needed.
iv) Click Save.
• To delete a registered resource
i) Select the resource to delete from the list.
ii) Click Delete.
Note: There is no confirmation window for this delete operation. Make sure that the selected
resource is the one you want to delete before you click Delete.
g) Under Injection Tuning Parameters, modify the listed parameters by double-clicking a value in
the Units column and editing inline as needed. To see a description of each parameter, hover your
mouse cursor on that parameter and a pop-up message that contains the description is displayed.
5. On the Issues tab, you can enable or disable certain issues.
Note: The list of issues control the events that are monitored by the inspection engine. If an issue is
disabled, the inspection engine no longer checks for this issue.
Parameter Description
File Name The entry specifies the name of the log file.
Rollover Size The maximum size to which a log file can grow before it is rolled over. The
default value is 2000000 bytes.
Buffer Size The maximum size of the message that is used when smaller events are
combined.
Queue Size There is a delay between events being placed on the queue and the file log
agent removing them. This parameter specifies the maximum size to which the
queue is allowed to grow.
High Water Processing of the event queue is scheduled regularly at the configured flush
Mark interval. It also is triggered asynchronously by the queue size reaching a high
water mark on the event queue. The default value is two-thirds of the maximum
configured queue size. If the maximum queue size is zero, the high water mark
is set to a default of 100. If the event queue high water mark is set to 1, every
event queued is relayed to the log agent as soon as possible.
Flush Interval This entry controls the frequency with which the server asynchronously forces a
flush of the file stream to disk. The value defined for this parameter is 0, < 0, or
the flush interval in seconds.
• If Log to Remote Authorization Server is selected:
Parameter Description
Compress To reduce network traffic, use this parameter to compress buffers before
transmission and expand on reception. The default value is no.
Buffer Size To reduce network traffic, events are buffered into blocks of the nominated
size before they are relayed to the remote server. This parameter specifies
the maximum message size that the local program attempts to construct by
combining smaller events into a large buffer. The default value is 1024 bytes.
Flush Interval This parameter limits the time that a process waits to fill a consolidation buffer.
The default value is 20 seconds. A flush interval of 0 is not allowed. Specifying a
value of 0 results in the buffer being flushed every 600 seconds.
226 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Parameter Description
Queue Size There is a delay between events being placed on the queue and the file log
agent removing them. This parameter specifies the maximum size to which the
queue is allowed to grow.
High Water Processing of the event queue is scheduled regularly at the configured flush
Mark interval. It also is triggered asynchronously by the queue size reaching a high
water mark on the event queue. The default value is two-thirds of the maximum
configured queue size. If the maximum queue size is zero, the high water mark
is set to a default of 100. If the event queue high water mark is set to 1, every
event queued is relayed to the log agent as soon as possible.
Error Retry If a send operation to a remote service fails, the system tries again. Before the
Timeout system tries again, it waits for the error retry timeout in seconds. The default
value is 2 seconds.
Logging Port Configure the port parameter to specify the port that the remote authorization
server listens on for remote logging requests. The default value is port 7136.
Rebind Retry If the remote authorization server is unavailable, the log agent attempts to
rebind to this server at this frequency in number of seconds. The default rebind
retry timeout value is 300 seconds.
Hostname The remote logging services are offered by the authorization service. The server
parameter nominates the hosts to which the authorization server process is
bound for event recording.
DN To establish mutual authentication of the remote server, a distinguished name
(DN) must be configured. A distinguished name must be specified as a string
that is enclosed by double quotation marks.
• If Log to Remote Syslog Server is selected:
Parameter Description
Remote Syslog The host to which the syslog server process is bound for event recording.
Server
Port The port on which the remote syslog server listens for remote logging
requests.
Application ID The name of the application, as it appears in the messages that are sent
to the remote syslog server.
Error Retry Timeout If a send operation to a remote service fails, the system tries again.
Before the system tries again, it waits for the error retry timeout in
seconds. The default value is 2 seconds.
Flush Interval This parameter limits the time that a process waits to fill a consolidation
buffer. The default value is 20 seconds. A flush interval of 0 is not allowed.
Specifying a value of 0 results in the buffer being flushed every 600
seconds.
High Water Mark Processing of the event queue is scheduled regularly at the configured
flush interval. It also is triggered asynchronously by the queue size
reaching a high water mark on the event queue. The default value is
two-thirds of the maximum configured queue size. If the maximum queue
size is zero, the high water mark is set to a default of 100. If the event
queue high water mark is set to 1, every event queued is relayed to the
log agent as soon as possible.
228 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• To add a inspection engine configuration parameter:
i) Click New.
ii) On the Add Inspection Parameter page that pops up, provide the parameter name and value.
iii) Click Save.
• To edit a inspection engine configuration parameter:
i) Select the parameter to edit from the list.
ii) Click Edit.
iii) On the Edit Inspection Parameter page that pops up, modify the parameter name and value as
needed.
iv) Click Save.
• To delete a inspection engine configuration parameter:
i) Select the parameter to delete from the list.
ii) Click Delete.
Note: There is no confirmation window for this delete operation. Make sure that the selected
resource is the one you want to delete before you click Delete.
8. Click Save.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Manage > Management Root.
All current management files and directories are displayed. The default directories include:
management
The Web Reverse proxy management pages. For example, login.html
errors
The error pages that can be returned by the Web Reverse proxy.
oauth
The HTML files that can be returned by the oauth module.
junction-root
The static HTML files that are served by the local junction of the Web Reverse proxy.
Note: A fixed location is used as the document root. A local junction cannot run any CGI scripts. It
can serve only static page content.
4. Work with all the management files and directories.
• Create a new file in the administration pages root
a. Select the directory in which you want to create the file.
b. Select File > New > File.
c. Enter the file name.
d. Optionally, you can add file contents in the New File Contents field.
e. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 39.
230 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• Export the contents of the administration pages root as a .zip file
a. Select Manage > Export Zip.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
b. Confirm the save operation when your browser displays a confirmation window.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance to update the management certificate for.
3. Select Manage > Renew Management Certificate.
4. Enter your administrator name and password.
5. Click Renew.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance to configure Mobile Multi-Factor Authentication for.
3. Select Manage > MMFA Configuration.
4. On the Main tab, select the type of traffic you want to apply MMFA to.
5. On the AAC LMI tab, provide the following details and then click Next.
Host name
The host name or IP address of the LMI server. This field is automatically populated with values
from the current browser window.
Port
The port number of the LMI server. This field is automatically populated with values from the
current browser window.
Username
The user name that is used to authenticate with the LMI server. The default value is admin.
Password
The password that is used to authenticate with the LMI server.
6. On the AAC Runtime tab, provide the following details and then click Next.
Host name
The host name or IP address of the runtime server. The default value is localhost.
Port
The port number of the runtime server. The default value is 443.
Username
The user name that is used to authenticate with the runtime server. The default value is easuser.
232 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 16. Reverse proxy status
You can use the local management interface (LMI) to manage status and view statistics.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. You can view the current state and version information of all instances.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Troubleshooting > Statistics.
4. Select the statistics component that you want to modify.
5. Click Edit.
6. Select the check box beside Enabled if it is not already checked.
7. Modify the Interval, Count, Flush Interval, Rollover Size, Maximum Rollover Files, and Compress
fields as needed.
By default, the Compress option is set to No. To save disk space, set the Compress option to Yes so
that all rollover files are automatically compressed.
8. Click Save to save your changes.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Troubleshooting > Statistics.
4. Select the statistics component of interest.
5. Click Files.
The file name, file size, and last modified time information of all statistics log files is displayed.
• View a statistics log file or a snippet of a statistics log file
a. Select the statistics log file that you want to view and then click View. The contents of the
statistics log file are displayed.
b. You can enter a value into the Number of lines to view field and then click Reload to get a
customized snippet view of the log file. Optionally, you can provide a value in the Starting from
line field to define the start of the lines. If the Starting from line field is set, then the Number
of lines to view field determines how many lines to view forward from the starting line. If the
Starting from line field is not set, then the Number of lines to view field determines how many
lines to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
• Export a statistics log file
a. Select the statistics log file that you want to export.
b. Click Manage > Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
c. Confirm the save operation in the browser window displayed.
• Delete a statistics log file
a. Select the statistics log file or files that you want to delete and then click Delete.
Note: Only log files that are not in use can be deleted. To disable a log file, you can select the log
file, click Edit, clear the Enabled check box, and then click Save.
b. Click Yes to confirm the operation.
• Delete all unused statistics log files
a. Click Manage > Delete All.
b. Click Yes to confirm the operation.
Archiving and deleting reverse proxy log files with the command-
line interface
Use the logs option in the command-line interface to archive Web Reverse Proxy log files to a USB device
and then delete old log files to free up disk space.
Procedure
1. In the command-line interface, go to isam > logs.
2. Optional: Enter help to display all available commands.
234 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
c. Enter YES to start the archive operation. A list of archived files are displayed, along with a
message that indicates when the archive operation has completed. Example output is shown as
follows:
Procedure
1. From the top menu, select Monitor > Reverse Proxy Graphs > Reverse Proxy Traffic.
2. On the Reverse Proxy Traffic page, specify the settings for the chart displayed.
Instance
The instance which the data displayed are specific to.
Aspect Type
The type of chart to display the data with. Select one from Column and Lines, Column, and Lines.
Start Date
The starting date.
Start Time
The starting time of the day.
Date Range
The duration over which data is collected and displayed. Select from 1 Hour to 30 Days.
For example, if the date and time that is chosen is 04.12.2012 10.00 and the duration is 12 Hours,
the data that are collected between 10:00 a.m. and 10:00 p.m. on 12th April 2012 are displayed.
By default, data of the first instance in the instance list for the last 24 hours are displayed, grouped by
junction.
Procedure
1. To view the Reverse Proxy Throughput:
Procedure
1. From the dashboard, locate the Reverse Proxy Health widget.
The health status of each instance, its junctions, and the junctioned servers are displayed in a
hierarchical structure. Health status is determined by the health of all elements lower than the current
element in the hierarchy.
• An instance is unhealthy if it is stopped or pdadmin cannot contact it.
• A junction is unhealthy if it is disabled or pdadmin cannot return information for it.
• A junctioned server is unhealthy if it is disabled or offline.
Each element can be in one of the three health states:
Warning The element contains at least one unhealthy child element and at
least one healthy child element.
236 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Viewing front-end load balancer health status
The health status of a front-end load balancer is determined by the state of the load balanced servers.
You can view the health status information with the Load Balancer Health dashboard widget.
Procedure
1. From the dashboard, locate the Load Balancer Health widget.
• Under High Availability (if high availability is configured):
– The first row displays the health status of the self front-end load balancer and whether it is active
or passive.
– The second row displays the health status of the peer front-end load balancer and whether it is
active or passive.
• Under Services (if at least one service is configured):
– The health status of the configured services and the load balanced servers are displayed in a
hierarchical structure. You can expand a service to view the health status of the servers that are
attached to this service.
Each element can be in one of the following health states:
Warning The element contains at least one unhealthy child element and at
least one healthy child element.
Procedure
1. From the dashboard, locate the Average Response Time widget.
The average response time for requests is displayed on a graph.
Note: The widget is only displayed if one or more Reverse Proxy instances have the Flow Data function
enabled.
2. Under Reverse Proxy Instances, select the instance to view the average response time statistics for.
3. Under Junctions, select the junctions to display on the graph. Each junction is represented by a
separate line on the graph.
4. Under Date Range, select the duration over which the response times are recorded.
Procedure
1. From the dashboard, locate the Security Actions widget. The number of times each defensive action
has been taken is displayed in a graph.
Note: The widget is only displayed if one or more instances have the security statistics function
enabled.
2. Under Reverse Proxy Instances, select the instances to view action statistics for.
Note: Only instances that have security statistics function enabled are listed for selection.
3. Under Actions, select the actions to be included in the statistics. The number of actions that are
displayed is the total of all selected actions.
4. Under Date Range, select the duration over which the actions are taken.
238 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 17. Junctions
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the reverse proxy to manage junctions for.
3. Select Manage > Junction Management.
4. Click New > Virtual Junction.
5. On the Junction tab page:
a) Enter the junction label in the Junction Label field.
b) Select the Stateful Junction check box if you want the junction to be stateful.
c) Select the HTTP/2 Junction check box if you want to enable HTTP/2 protocol to the junction
server.
d) Select the HTTP/2 Proxy check box if you want to enable HTTP/2 protocol to the proxy server.
e) Specify the Server Name Indicator (SNI).
f) Specify the virtual host aliases as a comma separated list of host names. The format of each host
name should be: <host>:<port>.
g) Select a junction type from the listed options on the right.
Notes for HTTP/2 junctions:
• The protected Web Server must serve HTTP/2 over both TCP and SSL for WebSEAL mutual
junction type with HTTP/2 to work. For example, Microsoft IIS only serves HTTP/2 over SSL. So
an HTTP/2 mutual junction type cannot be created to an IIS Web Server.
• TCP HTTP/2 junction connections do not use HTTP/2 upgrade. They require the "Prior
Knowledge" method to connect to an HTTP/2 Web Server over TCP. In Apache configuration
terms, this is the "Direct mode".
6. On the Servers tab page:
a) Click New to add a target back-end server.At lease one target back-end server must be added to
create a junction.
b) Complete the fields displayed.
c) Click Save.
7. On the Basic Authentication tab page:
a) Select the Enable Basic Authentication check box if BA header information is to be used for
authentication with the back-end server.
b) Enter the WebSEAL user name in the Username field.
c) Enter the WebSEAL password in the Password field.
d) Select the Enable mutual authentication to junctioned WebSEAL servers check box if mutual
authentication is to be used between a frontend WebSEAL server and a back-end WebSEAL server.
e) Select the key file from the list to use for mutual authentication.
f) Select the key label from the list to use for mutual authentication.
8. On the Identity tab page:
a) Define how WebSEAL server passes client identity information in BA headers to the back-end
server by selecting appropriate actions from the list under HTTP Basic Authentication Header.
b) If GSO is selected in the previous step, enter the GSO resource or resource group name in the
GSO Resource or Group field. If a value other than GSO is selected in the previous step, skip this
step.
c) Select what HTTP header identity information is passed to the back-end server in the HTTP
Header Identity Information field.
d) Select encoding from the list under HTTP Header Encoding.
e) Select the check box on the right as necessary.
9. On the SSO and LTPA tab page:
a) Select the Enable LTPA cookie Support check box if the junctions are to support LTPA cookies.
b) If LTPA version 2 cookies (LtpaToken2) are used, select the Use Version 2 Cookies check box.
c) Select the LTPA keyfile from the list under LTPA Keyfile.
d) Enter the keyfile password in the LTPA Keyfile Password field.
10. On the General tab page:
a) Specify the name of the form based single sign-on configuration file in the FSSO Configuration
File field.
b) Define the hard limit for consumption of worker threads in the Percentage Value for Hard Limit of
Worker Threads field.
c) Define the soft limit for consumption of worker threads in the Percentage Value for Soft Limit of
Worker Threads field.
d) If you want denied requests and failure reason information from authorization rules to be sent in
the Boolean Rule header, select the Include authorization rules decision information check box.
e) Click Save.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the reverse proxy to manage junctions for.
3. Select Manage > Junction Management.
4. Click New > Standard Junction.
5. On the Junction tab page:
a) Enter the junction point name. Names for standard junctions must start with a forward slash (/)
character.
b) Select the Create Transparant Path Junction check box if the junction name must match the
name of a subdirectory under the root of the back-end server document space.
c) Select the Stateful Junction check box if you want the junction to be stateful.
d) Select the HTTP/2 Junction check box if you want to enable HTTP/2 protocol to the junction
server.
e) Select the HTTP/2 Proxy check box if you want to enable HTTP/2 protocol to the proxy server.
f) Specify the Server Name Indicator (SNI).
g) Select a junction type from the listed options on the right.
Notes for HTTP/2 junctions:
240 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• The protected Web Server must serve HTTP/2 over both TCP and SSL for WebSEAL mutual
junction type with HTTP/2 to work. For example, Microsoft IIS only serves HTTP/2 over SSL. So
an HTTP/2 mutual junction type cannot be created to an IIS Web Server.
• TCP HTTP/2 junction connections do not use HTTP/2 upgrade. They require the "Prior
Knowledge" method to connect to an HTTP/2 Web Server over TCP. In Apache configuration
terms, this is the "Direct mode".
6. On the Servers tab page:
a) Click New to add a target back-end server. At least one target back-end server must be added
to create a junction. The options available when you add a server vary depending on the junction
type selected.
b) Complete the fields displayed.
c) Click Save.
7. On the Basic Authentication tab page:
Note: The properties on this tab are specific to SSL junctions. They are available only if you create an
SSL junction.
a) Select the Enable Basic Authentication check box if BA header information is to be used for
authentication with the back-end server.
b) Enter the WebSEAL user name in the Username field.
c) Enter the WebSEAL password in the Password field.
d) Select the Enable mutual authentication to junctioned WebSEAL servers check box if mutual
authentication is to be used between a frontend WebSEAL server and a back-end WebSEAL server.
e) Select the key file from the list to use for mutual authentication.
Note: The options in the list include certificates from both the local and network key files. The
certificates from the network key file are prefixed with the token label for the network HSM device.
8. On the Identity tab page:
a) Define how WebSEAL server passes client identity information in BA headers to the back-end
server by selecting appropriate actions from the list under HTTP Basic Authentication Header.
b) If GSO is selected in the previous step, enter the GSO resource or resource group name in the
GSO Resource or Group field. If a value other than GSO is selected in the previous step, skip this
step.
c) Select what HTTP header identity information is passed to the back-end server in the HTTP
Header Identity Information field.
d) Select encoding from the list under HTTP Header Encoding.
e) Select an option from the list under Junction Cookie Javascript Block.
f) Select the check box on the right as necessary.
9. On the SSO and LTPA tab page:
a) Select the Enable LTPA cookie Support check box if the junctions are to support LTPA cookies.
b) If LTPA version 2 cookies (LtpaToken2) are used, select the Use Version 2 Cookies check box.
c) Select the LTPA keyfile from the list under LTPA Keyfile.
d) Enter the keyfile password in the LTPA Keyfile Password field.
10. On the General tab page:
a) Specify the name of the form based single sign-on configuration file in the FSSO Configuration
File field.
b) Define the hard limit for consumption of worker threads in the Percentage Value for Hard Limit of
Worker Threads field.
c) Define the soft limit for consumption of worker threads in the Percentage Value for Soft Limit of
Worker Threads field.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the reverse proxy to manage junctions for.
3. Select Manage > Junction Management.
4. Perform junction-related tasks as needed.
• Create standard junctions
See “Creating standard junctions” on page 240.
• Create virtual junctions
See “Creating virtual junctions” on page 239.
• Edit a standard or virtual junction
a. Select the junction to edit from the list.
b. Click Edit.
c. Modify the settings as needed.
d. Click Save.
• Delete a standard or virtual junction
a. Select the junction to delete from the list.
b. Click Delete.
c. In the confirmation window that pops up, click Yes.
Note: Some junction management tasks can be performed only with the web service, but not the local
management interface. For example, functions achieved by using the following web service commands
cannot be achieved by using the local management interface:
• jmt load
• jmt clear
• offline
• online
• throttle
242 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 18. Federation management
Use the local management interface to configure your federations with a reverse proxy server.
Procedure
1. From the local management interface, select Web > Manage > Reverse Proxy.
A list of reverse proxy instances displays.
2. Select the reverse proxy instance name from the list.
3. Select Manage > Federation Management.
A list of federations configured for this reverse proxy instance displays.
4. Click Add.
A window opens where you can add the configuration information.
5. Enter the configuration details for the federation.
The Runtime tab provides authentication information for the federation runtime:
Host name
The host name or IP address of the runtime server. This field is required.
Port
The SSL port number of the runtime server. This field is required.
User name
The user name that is used to authenticate with the runtime server. This field is required.
Password
The password that is used to authenticate with the runtime server. This field is required.
The Federation tab specifies the federation name:
Federation Name
The name that identifies the federation that you are configuring on this reverse proxy instance.
Select the correct name from the list. If the federation name is not in the list, ensure that you set
up the runtime configuration properly for that federation.
The ACLs and Certificates tab indicates reuse of existing access control lists (ACLs) and certificates:
Reuse ACLs
Select to reuse any existing ACLs with the same name. If this check box is not selected, the ACLs
are replaced.
Reuse Certificates
Select to reuse the SSL certificate if it was already saved. If this check box is not selected, the
certificate is overwritten.
6. Click Submit.
Removing a federation from a reverse proxy server
You can remove a federation that was configured for a reverse proxy server.
Procedure
1. From the local management interface, select Web > Manage > Reverse Proxy.
A list of reverse proxy instances displays.
2. Select the reverse proxy instance name from the list.
3. Select Manage > Federation Management.
A list of federations configured for this reverse proxy instance displays.
4. Select the federation name from the list.
5. Click Remove.
A pop-up window is displayed for confirmation.
6. Click Yes.
244 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 19. Authorization servers
To manage IBM Security Verify Access authorization server instances, go to Web > Manage >
Authorization Server.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Click Manage > Cleanup Servers.
3. In the pop-up window, enter you IBM Security Verify Access administrator user name and password.
These are the same user name and password you would use with the pdadmin utility.
4. Click Login.
5. From the list of authorization servers, select the one to be removed.
Note: A red icon indicates that the server is uncontactable. Stopping a server also renders it
uncontactable. Make sure that you select only the instance that is no longer relevant in your current
environment and thus should be removed.
6. Click Delete.
Note: The Delete button is only clickable when an uncontactable server with a red icon is selected.
After you delete an instance, all knowledge of this instance is removed from the policy server including
LDAP.
7. In the confirmation window, click Yes to confirm the operation.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
The status of all authorization server instances is displayed.
2. Click New.
3. In the New Authorization Server Instance window, provide values for the displayed fields.
• On the Instance tab, define the following fields.
Field Description
Instance Name Name of the authorization server instance.
Host Name Name of the local host. The name is used during the construction
of the authorization server instance name. The default value is the
host name of the local system.
Authorization Port The port over which authorization requests are received. The
default value is the next available port from 7136.
Field Description
Administration Port The port over which Security Verify Access administration
requests are received. The default value is the next available port
after the authorization port value.
IP Addresses The IP addresses on which the authorization server listens for
requests. To add an IP address to the selected box, select the
address from the list immediately under IP Addresses and then
click Add. To remove an IP address from the selected list, select
the address from the box and then click Remove.
• On the IBM Security Verify Access tab, define the following fields.
Field Description
Administrator Name The administrator user name of IBM Security Verify Access.
Administrator Password The administrator user password of IBM Security Verify Access.
Domain The domain name of IBM Security Verify Access.
• If you use an LDAP server that is external to the appliance, a User Registry tab is also displayed. On
the User Registry tab, define the following fields.
Field Description
Enable SSL Specifies whether to enable SSL communication between the
instance and the LDAP server.
Key File Name The file that contains the LDAP SSL certificate. This field is only valid
if the Enable SSL check box is selected.
Certificate Label The LDAP client certificate label. This field is only valid if the Enable
SSL check box is selected.
Port The port number through which to communicate with the LDAP
server. This field is only valid if the Enable SSL check box is
selected.
4. Click Finish.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
The status of all authorization server instances is displayed.
2. Select the instance to delete.
3. Click Delete.
4. In the Delete Authorization Server Instance window, enter the administrator name and password.
5. Optional: If you want to unconfigure the instance even if the policy server is unreachable, select the
Force check box.
6. Click Delete to confirm the operation.
246 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Stopping, starting, or restarting an authorization server instance
To stop, start, or restart an authorization server instance, use the Authorization Server management page.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance of interest.
Stop an instance
a. Click Stop.
b. A message is displayed indicating that the instance is stopped successfully.
Start an instance
a. Click Start.
b. A message is displayed indicating that the instance is started successfully.
Restart an instance
a. Click Restart.
b. A message is displayed indicating that the instance is restarted successfully.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance of interest.
3. Select Manage > Configuration > Edit Configuration File.
The configuration file contents are displayed.
4. In the Advanced Configuration File Editor window, modify the configuration file.
5. Click Save to save the changes. If you want to revert to the last successfully saved version of this file,
click Revert. Or click Cancel if you do not want to save the changes.
Note: For the changes to take effect, the changes must be deployed and the running instance must be
restarted.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance of interest.
3. Select Manage > Configuration > Edit Tracing Configuration File.
The tracing configuration file contents are displayed.
4. In the Tracing Configuration File Editor window, modify the file.
5. Click Save to save the changes. Or click Cancel if you do not want to save the changes.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance to update the management certificate for.
3. Select Manage > Renew Management Certificate.
4. Enter your administrator name and password.
5. Click Renew.
248 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 20. Clusters
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select the Replicate with Cluster check box.
Note: This option is selectable on the primary master of the cluster only.
3. In the confirmation window, click Yes to confirm the operation.
The current IBM Security Verify Access runtime settings of the primary master and any future updates
are automatically replicated to the non-primary nodes.
Note: After you enable this replication option, you can no longer update the IBM Security Verify Access
runtime settings on the non-primary nodes of the cluster.
Procedure
1. From the top menu, select the menu for your activation level.
• Web > Manage > Distributed Session Cache
• AAC > Global Settings > Distributed Session Cache
• Federation > Global Settings > Distributed Session Cache
All replica set names and the number of sessions in each replica set are displayed.
2. You can then view the replica set server list and manage sessions in a particular replica set.
a) To view a list of the servers that are registered with a replica set, select the replica set and then
click Servers.
b) To manage the sessions in a replica set, select the replica set and then click Sessions.
Tip: Typically, the list of sessions contains many entries. You can locate a session or a user faster by
using the filter in the upper left corner.
Delete a specific session
i) Select the session to delete.
ii) Click Delete.
iii) In the confirmation window, click Delete Session.
Delete all sessions for a user
i) Select any session for that user.
ii) Click Delete.
iii) In the confirmation window, click Delete User.
250 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 21. Policy management with Web Portal
Manager
Web Portal Manager is a graphical management console for managing domains, users, groups,
permissions, policies, and other resources in your enterprise. The appliance provides an embedded
version of Web Portal Manager.
To access Web Portal Manager from the appliance, go to Web > Manage > Policy Administration.
Note: The Web Portal Manager panels might carry a different appearance than the other appliance panels.
This behavior is expected. It does not affect the performance of the embedded Web Portal Manager.
For more information about how to use Web Portal Manager, see 'Web Portal Manager' in "Access
Manager Platform and Supporting Components Administration Topics".
252 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 22. Global settings
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click URL Mapping.
4. Perform any of the following actions:
Viewing details of a DynURL configuration file:
a. Select the file to view.
b. Click Edit. The file content is displayed.
Creating a DynURL configuration file:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
d. Click Save.
Importing a DynURL configuration file:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting a DynURL configuration file:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
Modifying a DynURL configuration file:
a. Select the file that you want to modify.
b. Click Edit.
c. Modify the content of the file.
d. Enter the name for the file.
e. Click Save.
Renaming a DynURL configuration file:
a. Select the file that you want to rename.
b. Click Manage > Rename.
c. In the New Resource Name field, enter the new name for the file.
d. Click Save.
Deleting a DynURL configuration file:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 39.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click Junction Mapping.
4. Perform any of the following actions:
Viewing details of a JMT configuration file:
a. Select the file to view.
b. Click Edit. The file content is displayed.
Creating a JMT configuration file:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
d. Click Save.
Importing a JMT configuration file:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting a JMT configuration file:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
254 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Modifying a JMT configuration file:
a. Select the file that you want to modify.
b. Click Edit.
c. Modify the content of the file.
d. Click Save.
Renaming a JMT configuration file:
a. Select the file that you want to rename.
b. Click Manage > Rename.
c. In the New Resource Name field, enter the new name for the file.
d. Click Save.
Deleting a JMT configuration file:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 39.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click Client Certificate Mapping.
4. Perform any of the following actions:
Viewing details of a client certificate CDAS file:
a. Select the file to view.
b. Click Edit. The file content is displayed.
Creating a client certificate CDAS file:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
d. Click Save.
Importing a client certificate CDAS file:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click User Name Mapping.
4. Perform any of the following actions:
Viewing details of a user mapping CDAS file:
a. Select the file to view.
b. Click Edit. The file content is displayed.
Creating a user mapping CDAS file:
a. Click New.
b. Enter the name for the file.
c. Click Save.
Importing a user mapping CDAS file:
a. Click Manage > Import.
b. Click Browse.
256 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
c. Select the file that you want to import.
d. Click Import.
Exporting a user mapping CDAS file:
a. Select the file that you want to export.
b. Click Manage > Export.
c. Confirm that you want to save the file to your local workstation.
Modifying a user mapping CDAS file:
a. Select the file that you want to modify.
b. Click Edit.
c. Modify the content of the file.
d. Click Save.
Renaming a user mapping CDAS file:
a. Select the file that you want to rename.
b. Click Manage > Rename.
c. In the New Resource Name field, enter the new name for the file.
d. Click Save.
Deleting a user mapping CDAS file:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 39.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click Password Strength.
4. Perform any of the following actions:
Viewing details of a password strength rule file:
a. Select the file to view.
b. Click Edit. The file content is displayed.
Creating a password strength rule file:
a. Click New.
b. Enter the name for the file.
c. Click Save.
Importing a password strength rule file:
a. Click Manage > Import.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click Forms Based Single Sign-On.
4. Perform any of the following actions:
Viewing details of a forms based single sign-on file:
a. Select the file to view.
b. Click Edit. The file content is displayed.
Creating a forms based single sign-on file:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
258 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
d. Click Save.
Importing a forms based single sign-on file:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting a forms based single sign-on file:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
Modifying a forms based single sign-on file:
a. Select the file that you want to modify.
b. Click Edit.
c. Modify the content of the file.
d. Click Save.
Renaming a forms based single sign-on file:
a. Select the file that you want to rename.
b. Click Manage > Rename.
c. In the New Resource Name field, enter the new name for the file.
d. Click Save.
Deleting a forms based single sign-on file:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 39.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click HTTP Transformation.
4. Perform any of the following actions:
Creating an HTTP transformation rule file:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click RSA SecurID Configuration.
4. Perform any of the following actions:
Uploading a new RSA server configuration file
a. Click Upload in the Server Configuration File section.
b. Select the Server Configuration File to be uploaded.
260 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Note: The RSA configuration file to be uploaded to the appliance must be generated by the RSA
server.
c. Optional: Select the Server Configuration Options File to be uploaded.
Note: This is a text file named sdopts.rec. It contains the CLIENT_IP parameter that
specifies the IP address that the SecurID authentication method should use. For example,
CLIENT_IP=1.2.3.4.
d. Click Submit.
Uploading a new RSA server configuration options file
a. Click Upload in the Server Configuration Options File section.
b. Select the Server Configuration Options File to be uploaded.
Note: This is a text file named sdopts.rec. It contains the CLIENT_IP parameter that
specifies the IP address that the SecurID authentication method should use. For example,
CLIENT_IP=1.2.3.4.
c. Click Submit.
Downloading the RSA server configuration options file
a. Click Download in the Server Configuration Options File section.
Removing an RSA server configuration file:
a. Click Clear under the Server Configuration File section.
b. Confirm that you want to clear the configuration.
Removing the RSA server configuration options file
a. Click Clear under the Server Configuration Options File section.
b. Confirm that you want to clear the configuration and click Clear.
Testing a configuration
a. After uploading a server configuration file, click Test.
b. Enter a valid user.
c. Enter a valid passcode.
Note: You might need to disable two-step authentication on the RSA server to successfully test
the configuration, as the test function does not support two-step authentication.
Clearing a node secret
a. Click Clear under the Node Secret File section.
b. Confirm that you want to clear the secret.
5. Deploy the changes as described in “Configuration changes commit process” on page 39.
Procedure
1. Log in to the local management interface.
2. Click Web > Global Settings > Redis Configuration
3. Perform one of the following actions:
262 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Section Field Description
Cross Domain Support Enable Cross Domain Support Enable cross-domain support
so that a single Redis session
can be shared across multiple
DNS domains.
Master Authentication Server The base URL of the master
URL authentication server for this
collection of Redis servers.
The master authentication
server, if specified, will be
responsible for the generation
of all new sessions for this
collection. This field should
be of the format: http{s}://
<server>{:<port>}.
264 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Procedure
1. Log in to the local management interface.
2. Click Web > Global Settings > Web Application Firewall
3. Perform one of the following actions:
• Edit crs-setup.conf
a. Click crs-setup.conf > Edit configuration file.
b. Modify the content of the file.
c. Click OK to save the updated configuration.
Import crs-setup.conf
a. Click crs-setup.conf > Import.
b. Click Browse.
c. Browse to the file that you want to import to crs-setup.conf.
d. Click OK.
Export crs-setup.conf
a. Click crs-setup.conf > Export.
b. Confirm the save operation when your browser displays a confirmation window.
Creating a new Web Application Firewall rule
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
Note: The file name should end with the .conf suffix otherwise it will not be recognised as
a rules file.
d. Click OK to create the new rule.
Editing an existing Web Application Firewall rule
a. Select the rule which you wish to edit.
b. Click Edit.
c. Modify the content of the file.
d. Click OK to update the existing rule.
Deleting an existing Web Appliction Firewall rule
a. Select the rule which you wish to delete.
b. Click Delete.
c. Click OK to confirm the deletion of the selected rule.
Renaming an existing Web Application Firewall rule
a. Select the file which you wish to rename.
b. Click Manage > Rename.
c. Enter the new name for the file.
d. Click OK.
Import a Web Application Firewall rule
a. Select Manage > Import.
b. Click Browse.
c. Browse to the file that you want to import.
266 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 23. Global keys
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click SSO Keys.
4. Perform any of the following actions:
Creating an SSO key:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
d. Click Save.
Importing an SSO key:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting an SSO key:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
Deleting an SSO key:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 39.
Kerberos configuration
You can create, edit, delete, and test the following Kerberos settings from the local management
interface.
268 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Table 31. Manage Kerberos configuration settings (continued)
Setting Description
CA paths Contains the authentication paths that are
used with direct (non-hierarchical) cross-realm
authentication. Entries in this section are used by
the client to determine the intermediate realms
that can be used in cross-realm authentication. It
is also used by the end-service when it checks the
transited field for trusted intermediate realms.
keytab files Contains the keytab files that are used for Kerberos
authentication. The files contain pairs of Kerberos
principals and encrypted keys.
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
2. On the Defaults tab, take actions as needed.
• Create a property
a. Click New.
b. In the Create New Property window, select a name from the Pre-Defined Names list or enter a
name in the Name field as the name of the new property.
c. Provide the value of the new property in the Value field.
d. Click Save.
• Edit a property
a. Select the property to edit from the table.
b. Click Edit.
c. In the Edit Property window, modify the value of the property as needed.
d. Click Save.
• Delete a property
a. Select the property to delete from the table.
b. Click Delete.
c. In the Confirm Action window, click Yes.
• Test authentication with principal and password
a. Click Test.
b. In the Test Kerberos Authentication window, enter the name of the user that is created as the
web server principal in the Username field.
c. Enter the password in the Password field.
Managing realms
Use the Realms tab on the Kerberos Configuration management page in the LMI to manage these settings.
These settings describe realm-specific information.
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
2. On the Realms tab, take actions as needed.
• Create a realm
a. Click New > Realm.
b. In the Create New Realm window, enter the name of the new realm in the Realm field.
c. Click Save.
• Create a configuration subsection
a. Select the realm in which to create the subsection.
b. Click New > Subsection.
c. In the Create New Subsection window, select a name from the Pre-Defined Names list or enter
a name in the Subsection field.
d. Click Save.
• Create a property
a. Select the realm or subsection in which to create the property.
b. Click New > Property.
c. In the Create New Property window, select a name from the Pre-Defined Names list or enter a
name in the Name field.
d. Enter the value of the property in the Value field.
e. Click Save.
• Edit a property
a. Select the property to edit.
b. Click Edit.
c. In the Edit Property window, modify the value as needed.
d. Click Save.
• Delete a realm
a. Select the realm to delete from the table.
b. Click Delete.
c. In the Confirm Action window, click Yes.
• Test authentication with principal and password
a. Click Test.
b. In the Test Kerberos Authentication window, enter the name of the user that is created as the
web server principal in the Username field.
270 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
c. Enter the password in the Password field.
d. Click Test.
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
2. On the Domains tab, take actions as needed.
• Create a domain realm property
a. Click New.
b. In the Create New Translation window, enter the local DNS address in the Local DNS Value
field.
c. Select a realm from the Realm list.
d. Click Save.
• Edit a domain realm property
a. Select the domain realm property to edit from the table.
b. Click Edit.
c. In the Edit Property window, modify the realm as needed.
d. Click Save.
• Delete a domain realm property
a. Select the domain realm property to delete from the table.
b. Click Delete.
c. In the Confirm Action window, click Yes.
• Test authentication with principal and password
a. Click Test.
b. In the Test Kerberos Authentication window, enter the name of the user that is created as the
web server principal in the Username field.
c. Enter the password in the Password field.
d. Click Test.
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
2. On the CA Paths tab, take actions as needed.
• Create a CA path
a. Click New > Client Realm.
b. In the Create Client Realm window, enter the realm name in the Client Realm field.
c. Click Save.
• Create a property
a. Select the client realm in which to create the property.
b. Click New > Property.
c. In the Create New Property window, provide a value for the Server Realm and Intermediate
Realm.
d. Click Save.
• Edit a property
a. Select the property to edit from the table.
b. Click Edit.
c. In the Edit Property window, modify the value as needed.
d. Click Save.
• Delete a CA path
a. Select the CA path to delete from the table.
b. Click Delete.
c. In the Confirm Action window, click Yes.
• Delete a property
a. Select the property to delete from the table.
b. Click Delete.
c. In the Confirm Action window, click Yes.
• Test authentication with principal and password
a. Click Test.
b. In the Test Kerberos Authentication window, enter the name of the user that is created as the
web server principal in the Username field.
c. Enter the password in the Password field.
d. Click Test.
272 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Managing keytab files
Use the Keyfiles tab on the Kerberos Configuration management page in the LMI to manage these
settings.
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
2. On the Keyfiles tab, take actions as needed.
• Import a keytab file
a. Click Import.
b. In the Import Keytab File window, click Browse.
c. Select the keytab file to be imported and then click Open.
d. Click Import.
• Delete a keytab file
a. Select the file to delete from the table.
b. Click Delete.
c. In the Confirm Action window, click Yes.
• Combine keytab files
a. Select the keytab files to be combined from the table.
b. Click Combine.
c. In the Combine Keytab Files window, enter the name for the combined file in the New
Resource Name field.
d. Click Save.
• Verify authentication with a keytab file
a. Select the keytab file to test from the table.
b. Click Test.
c. In the Test Keytab Authentication window, provide the value of the Kerberos principal in the
Username field.
d. Click Test.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy if you want to manage tracing for a reverse
proxy instance. Or select Web > Manage > Authorization Server if you want to manage tracing for an
authorization server instance.
2. Select the instance of interest.
3. For reverse proxy, select Troubleshooting > Tracing. For authorization server, select Manage >
Tracing.
4. Select the component to be modified and then click Edit.
5. Modify the trace level, flush interval, rollover size, maximum rollover files, and whether rollover files
are automatically compressed.
By default, the Compress option is set to No. To save disk space, set the Compress option to Yes so
that all rollover files are automatically compressed.
6. Click Save.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy if you want to manage tracing for a reverse
proxy instance. Or select Web > Manage > Authorization Server if you want to manage tracing for an
authorization server instance.
2. Select the instance of interest.
3. For reverse proxy, select Troubleshooting > Tracing. For authorization, select Manage > Tracing.
4. Select a component and then click Files to view a list of all its trace and rollover files.
The file name, file size, and last modified time of each file is displayed.
View or export a trace file or rollover file
a. Select the file of interest.
b. Click View. The content of the trace files is then displayed. To view a particular number of lines
of trace, provide a value in the Number of lines to view field and then click Reload. Optionally,
you can provide a value in the Starting from line field to define the start of the lines. If the
Starting from line field is set, then the Number of lines to view field determines how many
lines to view forward from the starting line. If the Starting from line field is not set, then the
Number of lines to view field determines how many lines to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
c. Click Export if you want to export the file.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
d. Confirm the save operation when the browser prompts you to save the file.
Delete a trace file or rollover file
a. Select the file or files of interest.
Note: Only a file that is not in use can be deleted.
b. Click Delete.
c. Click Yes to confirm the operation.
Export a trace file or rollover file
a. Select the file of interest.
b. Click Manage > Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
c. Confirm the save operation when the browser prompts you to save the file.
Delete all trace files and rollover files that are not in use
a. Click Manage > Delete All.
b. Click Yes to confirm the operation.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select Manage > Configuration Files > Tracing Configuration Files.
The tracing configuration file contents are displayed.
Note: The Tracing Configuration File menu item is available only when a local policy server is
configured. When a remote policy server is configured, this menu item is disabled. In that case, you
must directly edit the file on the machine where the policy server is installed.
3. In the Tracing Configuration File Editor window, modify the file.
4. Click Save to save the changes. Or click Cancel if you do not want to save the changes.
Note: For the changes to take effect, the changes must be deployed and the runtime environment
must be restarted.
276 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Updating a tracing configuration file
To update a tracing configuration file with the local management interface, use the Reverse Proxy
Instances management page.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Manage > Configuration > Edit Tracing Configuration File.
The tracing configuration file contents are displayed.
4. Modify the file.
5. Click Save to save the changes. Or click Close if you do not want to save the changes.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 39.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Optional: If instance-specific log files are of interest, select the instance.
3. Select Troubleshooting > Logging.
If an instance is selected, details of all common log files and instance-specific log files are displayed. If
no instance is selected, only details of the common log files are displayed.
You can use the filter bar under Name to filter entries that meet specific conditions. Click Clear filter
to return to the full list.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Optional: If instance-specific log files are of interest, select the instance.
3. Select Troubleshooting > Logging.
4. Select the log file that you want to view.
5. Click View.
The content of the log file is displayed. By default, the last 100 lines of a log file is displayed if the
file is longer than 100 lines. You can define the number of lines to display by entering the number in
the Number of lines to view field and then click Reload. Optionally, you can provide a value in the
Starting from line field to define the start of the lines. If the Starting from line field is set, then the
Number of lines to view field determines how many lines to view forward from the starting line. If the
Starting from line field is not set, then the Number of lines to view field determines how many lines
to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
6. Click Export to download the log file.
Note: You must configure the software that blocks pop-up windows in your browser to allow pop-up
windows for the appliance before files can be exported.
You can also export a file by selecting it and then clicking Manage > Export.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Optional: If instance-specific log files are of interest, select the instance.
3. Select Troubleshooting > Logging.
4. Select the log file or files that you want to clear.
5. Click Clear.
6. On the Confirm Action confirmation page, click Yes.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Troubleshooting > Transaction Logging.
All transaction logging components and their status, total file size, and rollover size are displayed.
• Enable or disable a transaction logging component
a. Select the transaction logging component of interest.
b. Click Edit.
c. Select or clear the Enabled check box to enable or disable the transaction logging component.
d. Optionally, define the rollover size by providing a value in the Rollover Size field. If no value is
provided, the default rollover size is used.
e. Optionally, define the maximum number of rollover files by providing a value in the Maximum
Rollover Files field. If no value is provided, no rollover files will be deleted.
f. Optionally, set the Compress option to Yes so that all rollover files are automatically
compressed to save disk space. By default, the Compress option is set to No.
g. Click Save to save your changes.
• Rollover the data file of a transaction logging component
a. Select the transaction logging component of interest.
b. Click Manage > Rollover.
c. Click Yes to confirm the operation.
• Manage transaction logging data files
a. Select the transaction logging component of interest.
b. Click Files.
– Export a transaction logging data file
280 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
i) Select the transaction logging data file of interest.
ii) Click Manage > Export.
Note: You must configure the software that blocks pop-up windows in your browser to
allow pop-up windows for the appliance before files can be exported.
iii) Confirm whether to open or save the exported file in the browser window.
– Delete a transaction logging data file
Note: Only transaction logging data files that are not in use can be deleted.
i) Select the transaction logging data file or files of interest.
ii) Click Delete.
iii) Click Yes to confirm the operation.
– Delete all unused transaction logging data files
i) Click Manage > Delete All.
ii) Click Yes to confirm the operation.
Procedure
1. From the top menu, select Monitor > Logs > Manage Reverse Proxy Log Files.
Details of all common log files are displayed under Log Files for Selected Instance.
You can use the filter bar under Name to filter entries that meet specific conditions. Click Clear filter
to return to the full list.
2. Optional: If instance-specific log files are of interest, select the instance from the list under Reverse
Proxy Instances.
Details of all common log files and instance-specific log files are displayed under Log Files for
Selected Instance.
3. Work with the reverse proxy log files.
• View the content of a reverse proxy log file
a. Select the log file that you want to view.
b. Click View. The content of the log file is displayed. By default, the last 100 lines of a log file are
displayed if the file is longer than 100 lines. You can define the number of lines to display by
entering the number in the Number of lines to view field and then click Reload. Optionally, you
can provide a value in the Starting from line field to define the start of the lines. If the Starting
from line field is set, then the Number of lines to view field determines how many lines to view
forward from the starting line. If the Starting from line field is not set, then the Number of lines
to view field determines how many lines to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
c. Optional: Click Export to download the log file.
Note: You must configure the software to block pop-up windows in your browser to allow pop-up
windows for the appliance before files can be exported.
• Export a reverse proxy log file
a. Select the log file that you want to export.
b. Click Manage > Export.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance of interest.
3. Select Manage > Logging.
4. Work with the authorization server log files as needed.
View the content of an authorization server log file
a. Select the log file that you want to view.
b. Click View. The content of the log file is displayed. By default, the last 100 lines of a log file
are displayed if the file is longer than 100 lines. You can define the number of lines to display
by entering the number in the Number of lines to view field and then click Reload. Optionally,
you can provide a value in the Starting from line field to define which line in the log file to
start viewing from. If the Starting from line field is set, then the Number of lines to view field
determines how many lines to view forward from the starting line. If the Starting from line field
is not set, then the Number of lines to view field determines how many lines to view from the
end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
c. Optional: Click Export to download the log file.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
Clear an authorization server log file
a. Select the log file that you want to clear.
b. Click Clear.
c. On the Confirm Action confirmation page, click Yes. A system notification is displayed to
indicate that the log file is successfully cleared. The original log file with empty content remains
in the log list. Any rollover log files (for example, xxx.log.1 and xxx.log.2) are deleted.
Export an authorization server log file
a. Select the log file that you want to export.
b. Click Manage > Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
c. Confirm the save operation in the browser window to export the file to a local location.
282 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Chapter 26. Front-end load balancer
The appliance provides front-end load balancing function to automatically assign client requests to the
appropriate reverse proxy server based on the scheduling specified algorithm.
In an IBM Security Verify Access environment, you can have many services. Each service has a virtual IP
address and a port. Every service is available on one or more real servers. Each server is defined by IP
address and a port. The front-end load balancer maps incoming service requests to real servers.
A front-end load balancer is a server that uses a virtual IP address to accept requests from a client.
It determines which reverse proxy server is most suitable to handle the request and forwards it to the
appropriate reverse proxy server.
Incoming requests from the same client are forwarded to the same server. That is, the front-end load
balancer provides stickiness or persistence for existing sessions. The load balancer uses a scheduling
algorithm to forward requests from clients that are not already assigned to a back-end server.
In a typical setup, there are two front-end load balancer servers and multiple reverse proxy servers.
Configuring two front end load balancers in the environment provides high availability for the front-end
load balancing service.
A heartbeat is transmitted between the two front-end load balancers so that the state of each front-end
load balancer is known. The load balancer that is actively receiving and processing requests is known as
the active load balancer. The other load balancer is known as the passive load balancer.
When available, the primary front-end load balancer acts as the active load balancer. It is assigned the
virtual IP address for the load balancing service and awaits incoming client requests.
If the primary front-end load balancer becomes unavailable, the backup load balancer can no longer
detect heartbeats. In this situation, the backup load balancer assumes the virtual IP address and starts
accepting requests from clients. That is, the backup load balancer becomes the active load balancer until
the primary load balancer is restored.
Note: You can have only two front-end load balancers in your environment.
It is possible to configure the reverse proxy functionality on an appliance that is also acting as a front-end
load balancer. However, this configuration might have a negative impact on the performance of the
front-end load balancer. If you decide to use such setting, you must take the resources that are used by
the reverse proxy into consideration.
You must make sure that the front-end load balancer still has enough resources to perform routing
effectively.
You can configure a highly available web reverse proxy environment with as few as two appliances, as
shown in Figure 7 on page 284. The active load balancer is on the primary appliance. This load balancer
assumes the virtual IP address for the load balancing service. Client requests are received from the
Internet-facing network, 10.254.140.0. The load balancer distributes these requests between the web
reverse proxy servers, which are on the 10.254.140.0 network.
Scheduling
The front-end load balancing function of the appliance supports several types of scheduling.
In your environment, you might have some servers that are more powerful than others. You can configure
the front-end load balancer to respect the relative performance of each server by setting a weight value
for each server. You can assign weights between 1 and 256, with 256 indicating the most powerful server.
For more information about how to configure the weight of each server and select the scheduling
algorithm, see “Configuring front-end load balancer” on page 287.
The following scheduling types are supported:
284 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
lc
Least connection. The server with the lowest number of connections receives the request. This
algorithm is dynamic so you can update the weight ratios in real time.
rr
Round robin. Requests are rotated between the servers. This algorithm is dynamic and uses the
weight parameter that is assigned to each server.
srr
Static round robin. Each server is used in turn according to the defined weight for the server. This
algorithm is static so you cannot dynamically change the weight ratio for a server.
sh
Source hashing. A hash of the source IP is divided by the total weight of the running servers to
determine which server receives the request. This algorithm inherently sends requests from the same
IP address to the same server provided that the available servers remains unchanged.
Persistence
Session persistence, also known as stickiness, is a mechanism that ensures a client is connected to the
same reverse proxy server during a session.
Layer 4 load balancers can extract the client IP address from the TCP header to maintain persistence.
Layer 7 load balancers can use an HTTP cookie to provide stickiness. Subsequent requests from a
particular client are routed through the same processing path and use the same WebSEAL session.
The point of SSL termination depends on the load balancing layer. In a layer 4 configuration, WebSEAL is
responsible for the SSL termination. In a layer 7 configuration, SSL is terminated by the load balancer.
286 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
rspadd
Adds a header to the end of the HTTP response.
rspdel
Headers that match a specified regular expression are deleted from the response.
rsprep
(Case-sensitive) Search the HTTP response line for a specified regular expression and replace any
instances with a specified string.
rspirep
(Case-insensitive) Search the HTTP response line for a specified regular expression and replace any
instances with a specified string.
The available attributes to assist with HTTP header based balancing are as follows:
balance
hdr(<name>) Overrides the standard scheduler to enable balancing on the specified HTTP request
header.
There are also generic attributes to configure connection properties for the front-end load balancer. For
example, you can set values for the connection timeout, number of retries, and number of concurrent
connections. For a complete list of the available attributes, see “Configuring front-end load balancer” on
page 287.
Procedure
1. From the top menu, select System > Network Settings > Front End Load Balancer.
2. On the General tab page:
a) Select Enabled if you want to enable this front-end load balancer.
b) Select Debug if you want more debug messages to be sent to the security log.
c) Select Enable SSL if you plan to enable SSL communication for any Layer-7 services.
d) In the SSL Key File list, select the key file that contains the certificates to be used in the Layer-7
SSL communication.
Note: The SSL Key File list can only be selected if Enable SSL is enabled.
3. Optional: On the Advanced Tuning tab page, modify global level parameters to fine tune the
configuration.
a) Click Add.
b) In the Add New Parameter window, select the desired parameter from the Name list.
c) Enter a value for the selected parameter in the Value field.
d) Click Save.
4. On the Servers tab page, you can work with virtual servers and real servers. Each virtual server
corresponds to an interface (virtual IP address and port) that is load balanced. Each real server
corresponds to a load balanced server.
• Add a virtual server
a. Click New.
b. On the Add Virtual Server page, define settings of the virtual server to be added.
On the General tab page:
Virtual Address Specifies the IP address that connects this virtual server to the public
network.
Port Specifies the port on which this virtual server listens.
Mask Specifies the network mask to be applied to the IP address for the
virtual server.
Interface Specifies the appliance interface on which the new virtual server
connects to the public network.
Layer 4 or Layer 7 The load balancing layer for the server. Layer 4 indicates TCP level load
balancing. Layer 7 indicates application level load balancing.
Cookie used in Layer The name of the cookie to be used in Layer 7 load balancing.
7
Note: This field is available only when Layer 7 load balancing has been
selected.
Layer 7 SSL The label of the certificate to be used when terminating the connection.
Certificate Label
Note: This field is available only when Layer 7 load balancing has been
selected.
288 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Field Description
Scheduler Specifies the scheduling algorithm for distributing jobs to the real
servers. Available choices are:
lc
Least connection. The server with the lowest number of connections
receives the request. This algorithm is dynamic so you can update
the weight ratios in real time.
rr
Round robin. Requests are rotated between the servers. This
algorithm is dynamic and uses the weight parameter that is assigned
to each server.
srr
Static round robin. Each server is used in turn according to the
defined weight for the server. This algorithm is static so you cannot
dynamically change the weight ratio for a server.
sh
Source hashing. A hash of the source IP is divided by the total
weight of the running servers to determine which server receives
the request. This algorithm inherently sends requests from the same
IP address to the same server provided that the available servers
remains unchanged.
For Layer 4 operations, only a scheduler setting of sh (source hash)
specifies to use all CPUs available on the appliance. If other scheduler
settings are used for Layer 4 operation, then the load balancer process
operates that particular virtual server by using one CPU. This behavior
might impact performance of the front end load balancer for the virtual
server, particularly if the back-end servers are using SSL.
For Layer 7 operations, all CPUs available are always used regardless of
the scheduler setting.
Health Check Number of seconds between health check messages that are sent to the
Interval real servers.
Rise The number of successful health checks before a server is considered
active.
Fall The number of unsuccessful health checks before a server is considered
inactive.
Optional: On the Advanced Tuning tab page, add, edit, or delete any service level
advanced configuration parameters as needed. See “Front-end load balancer advanced tuning
parameters” on page 291 for the available parameters. See “Benefits of layer 7 load balancing”
on page 286 for descriptions of the advanced tuning attributes available.
c. Click Save.
• Delete a virtual server
a. Select the virtual server to delete from the list.
b. Click Delete.
c. On the confirmation page, click Yes.
• Edit a virtual server
a. Select the virtual server to edit from the list.
b. Click Edit.
c. On the Edit Virtual Server page, modify the settings as needed.
Field Description
Enabled Specifies whether the new real server is active.
Address Specifies the IP address for the real server.
Weight Specifies an integer that represents this processing capacity of
the server relative to that of other real servers. For example,
a server assigned 2000 has twice the capacity of a sever
assigned 1000. The weighted scheduling algorithms adjust
this number dynamically based on workload.
SSL Enabled Specifies whether to use an SSL connection between the load
balancer and the back-end server.
SSL Certificate Label Specifies the SSL certificate label.
iii) Click Save.
– To delete a real server:
i) Select the real server to delete from the list.
ii) Click Delete.
iii) On the confirmation page, click Yes.
– To edit a real server:
i) Select the real server to edit from the list.
ii) Click Edit.
iii) On the Edit Real Server page, modify the settings as needed.
iv) Click Save.
c. Click Close to return to the Front End Load Balancer main page.
5. On the High Availability tab page, you can define the settings that enable high availability of the
front-end load balancer function. For example, configure a second front-end load balancer as either a
primary or a back-up load balancer for the environment.
a) Select the Enable High Availability check box to enable this feature.
b) Select Primary or Backup to designate this system as the primary or backup front-end load
balancer.
c) For the Local Interface - Primary field, select the local IP address of the front-end load balancer.
d) For the Remote Address - Backup field, specify the IP address that is used by this system to
communicate with the other front-end load balancer. This field is required if a backup load balancer
is in use.
e) For the Remote Port field, specify the port to be used for high availability communication.
f) In the Health Check Interval field, specify in seconds the interval of the heartbeat messages that
are sent between the primary and backup front-end load balancers.
g) In the Health Check Timeout field, specify in seconds the time to wait before the system declares
a non-responsive router unavailable and initiating failover.
290 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
6. On the Logging tab page, configure the local or remote logging options.
• If you select Log to local, no additional configuration is required on this page.
• If you select Log to remote, you must provide values for Syslog facility, Remote syslog server
address, and Remote syslog server port.
7. On the Error Pages tab page, customize the error pages (200, 400, 403, 408, 500, 502, 503, and 504)
that are returned by the software. These error pages are returned when the layer-7 load balancing
function encounters a problem.
• To edit an existing error page:
a. Select the error page to customize.
b. Click Edit.
c. In the Edit File window, modify the error page as needed.
d. Click Save.
• To import a new page to replace an existing error page:
a. Select the error page to be replaced.
b. Click Import.
c. In the Import Error Page window, click Browse.
d. Select the new page.
e. Click Save.
• To export an error page:
a. Select the error page to export.
b. Click Export.
c. Specify the destination location to export the file to.
d. Click Export to confirm the operation.
8. Click Save to save all changes that are made on the Front End Load Balancer management page.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 39.
Syntax
replica set show replica_set_name
Options
replica_set_name
Specifies the name of the replica set.
Examples
The following example returns details about the ibm.com replica set:
Syntax
replica set list
Options
N/A
Examples
The following example lists all the replica sets:
Syntax
session terminate all_sessions user_id replica-set-name
Options
user_id
Specifies the name of the user. An example of user name is sec_master. Pattern matching can be
used when specifying the user name.
replica_set_name
Specifies the name of the replica set.
Examples
The following example terminates all sessions for the sec_master user in the ibm.com replica set:
The following example terminates all sessions whose user names start with sec_m in the ibm.com
replica set:
Syntax
session terminate session session-id replica-set-name
Options
session-id
Specifies the ID of a user session.
replica_set_name
Specifies the name of the replica set.
Examples
The following example terminates session 678 in the ibm.com replica set:
294 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
session list
Lists all session management sessions within the specified replica set.
Syntax
session list pattern maximum_return replica_set_name
Options
pattern
Specifies the pattern for returning user names. The pattern can include a combination of wild card and
string constant characters. The pattern is not case-sensitive. For example, you can specify *luca* or
*LUCA* as the pattern to find all users that contain the substring luca in the user name.
Note: Only the asterisk (*) character can be used as wild card.
maximum_return
Specifies the maximum number of sessions to return. When there are more matches than designated
by this option, the output contains the number of matches.
replica_set_name
Specifies the name of the replica set.
Examples
The following example (entered as one line) lists the user sessions in the ibm.com replica set for users
that contains the string ons and limits the number of matches to 100:
exit or quit
Use either the exit command or the quit command to exit from the dscadmin utility interactive
command-line mode.
Syntax
exit
quit
Options
N/A
Examples
The following example displays how to exit the dscadmin utility:
dscadmin> exit
dscadmin> quit
Components
The API Access Control component is broken into three separate sub components.
Resource Servers
Each of these defines a single server that hosts the API that is being protected.
Resources
Each of these defines a single API.
Resource Access Policies
These are the authorisation policies for accessing the resource.
The following diagram shows the hierarchy of the sub components.
Authorization
The API Access Control component introduces a new objectspace named /WebSEAL_API.
The new objectspace is used to contain the protected objects that represent both resource servers and
resources (described below). The hierarchy of the protected objects in this objectspace resembles the
WebSEAL objectspace:
/WebSEAL_API/<hostname>-<instance_name>/<resource_server>/<resource>
The objectspace is managed by the API Access Control component and any requests made to a protected
API will use it in the authorization decision. The protected object used in the access control decision
depends upon the configuration of the API Access Control policy.
1. If a non default policy is applied to the API Access Control resource, the ACL and/or POP that is
attached to the resource protected object is used for the access control decision.
2. If a non default policy is applied to the API Access Control resource server, the ACL and/or POP that is
attached to the resource server protected object is used for the access control decision.
3. If the default policy is specified for the resource and resource server the ACL and/or POP that is
attached to the WebSEAL junction protected object is used for the access control decision.
The following diagram shows the flow of the protected objects that are used in an access control decision
when default policy is applied to the resource and resource server.
298 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Resource Servers
A resource server is the definition of the server that provides access to the RESTful API that is being
protected.
Each resource server corresponds to a Reverse Proxy junction. The API Access Control component
provides an extended configuration mechanism that allows more than just the standard junction
management. It provides a way to:
1. Create a basic standard junction with only the minimal required configuration or an advanced junction
creation that provides all of the standard junction create options.
2. Set the authentication options for incoming requests to the resource server.
3. Set the default authentication policy for all requests to the resource server.
4. Set static response headers that are set on every response to requests to the resource server.
The base level operations that occur internally when you creating a new resource server include the
following:
• The junction is created.
• The Reverse Proxy administrative pages root directories are updated to include new directories that are
specific to the new resource server. Pages that are specific to the resource server can be placed in these
locations.
• The Reverse Proxy configuration file is updated to include any OAuth introspection configuration as well
as static response header definitions.
• A new IBM Security Verify Access protected object is created to represent the new resource server.
• A new Access Control List (ACL) might be created to represent the authentication policy. This ACL is
then attached to the new protected object.
Note: Due to the different mix of IBM Security Verify Access operations that are performed, there are
some tasks which are completed immediately (for example, pdadmin tasks) and some tasks that are
not completed until the next commit operation is executed. This means that there might be orphaned
protected objects, ACLs and POPs if the creation is followed by a rollback of the pending changes.
Therefore, take precaution if the administrator chooses to roll back the pending changes instead of
deploying them.
Take the following actions, if a cleanup or audit of orphaned API Access Control artifacts is required:
• Objects under the /WebSEAL_API object space must be reviewed and unnecessary objects removed;
• ACLs that have a suffix of "_resource_access_control_policy" must be reviewed and unnecessary ACLs
must be removed.
<!--This stylesheet is used to set static response headers in the HTTP Response for the GET /test resource.-->
<xsl:template match="/">
<HTTPRequestChange>
<xsl:apply-templates
300 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
select="//HTTPRequest/Headers/Header[@name = 'accept']"/>
<xsl:apply-templates select="//HTTPRequest/RequestLine"/>
<!--Set the ACL bits that will be used for authorisation for this resource.-->
<AclBits>T</AclBits>
<!--Set the object name which will be used in the authorization decision.-->
<ObjectName>/WebSEAL_API/isam.test.ibm.com-default/scim/GET/scim/groups</ObjectName>
</HTTPRequestChange>
</xsl:template>
<!--Handle any URL aliasing-->
<xsl:template match="//HTTPRequest/RequestLine">
<xsl:choose>
<xsl:when test="external:matches(URI, ‘^/scim/groups/.*’)”>
<URI>
<xsl:value-of
select="external:replace(URI, ‘/scim/groups/(.*)’, ‘/scim/groups$1')"/>
</URI>
</xsl:when>
</xsl:choose>
</xsl:template>
<!--Manage any requests for documentation using the accept header.-->
<xsl:template match="//HTTPRequest/Headers/Header[@name = 'accept']">
<xsl:if test="node()=‘application/swagger.json'">
<URI>/apiac/scim/groups.json</URI>
</xsl:if>
</xsl:template>
</xsl:stylesheet>
<!--This stylesheet is used to set static response headers in the HTTP Response for the GET /test resource.-->
<!--Firstly, strip any space element-->
<xsl:strip-space elements="*"/>
<xsl:template match="/">
<HTTPResponseChange>
<Header action="add" name="Strict-Transport-Security">true</Header>
</HTTPResponseChange>
</xsl:template>
</xsl:stylesheet>
Note: Due to the different mix of IBM Security Verify Access operations that are performed, there are
some tasks which are completed immediately (for example, pdadmin tasks) and some tasks that are
not completed until the next commit operation is executed. This means that there might be orphaned
protected objects, ACLs and POPs if the creation is followed by a rollback of the pending changes.
Therefore, take precaution if the administrator chooses to roll back the pending changes instead of
deploying them.
Take the following actions, if a cleanup or audit of orphaned API Access Control artifacts is required:
• Objects under the /WebSEAL_API object space must be reviewed and unnecessary objects removed;
• ACLs that have a suffix of "_resource_access_control_policy" must be reviewed and unnecessary ACLs
must be removed.
Deletion of a resource that has a rate limiting policy applied results in the method and path being
removed from the rate limiting policy file but the policy is not removed from the Reverse Proxy
configuration file. If the rate limiting policy is no longer required, it can be manually removed from the
'[rate-limiting]' stanza of the Reverse Proxy configuration file.
Resource Documentation
IBM Security Verify Access provides the capability for a RESTful API to be extended such that a request
can be made to retrieve documentation for the API.
This is achieved through the use of a HTTP Transformation rule. The rule will look for a certain accept
header value and if it exists the documentation file which was provided during the configuration of the API
will be returned.
For example an API Access Control resource GET /scim/groups is configured with the
documentation content type set to application/swagger.json and the documentation file set
API Access Control allows the API documentation HTTP Transformation rule to be created and enabled
when you are creating or modifying a resource. Set the documentation content type and file as part of the
resource data.
The documentation files are served by the Web Reverse proxy local junction and are stored within the /
apiac directory.
The new location can be managed by using the new API Access Control management capabilities or as
part of the existing Reverse Proxy management root. The directory is created when an API resource is
first created and cannot be deleted. Files can be added directly to the /apiac directory or a complex sub
directory structure can be created.
302 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
• The POP has one or more requires attributes set. These are used for credential attribute checks.
– Multiple credential attributes can be specified in a single POP attribute. In this case only one of the
specified attributes need to match. (OR condition).
– Multiple POP attributes can be specified and in this case every POP attribute must evaluate to true
(AND condition).
• If all of the attribute checks are true access is allowed
For example:
A policy named "test" is created with the following groups:
• admin
• privileged
and the following attribute checks:
• scope=usr:write OR scope=usr:admin
• AuthenticationLevel=2
This results in the creation of the ACL and the POP:
resource_access_policy_test
resource_access_policy_test
[cors-policy:apiac_policyA]
# *************************************************************************
****************************************#
THIS STANZA IS AUTO GENERATED. PLEASE DO NOT UPDATE AS IT MAY CAUSE PROBLEMS WITH THE API
ACCESS CONTROL COMPONENT
# *************************************************************************
****************************************
handle-pre-flight = false
max-age = 0
allow-credentials = false
allow-origin = http://test.com
request-match = GET /application/endpointA HTTP/*
To create a new CORS policy, see “Creating a CORS policy” on page 317.
To add a CORS policy to an API Access Control resource, see “Create a new Resource” on page 313 and
“Modify an Existing Resource” on page 314
For more information on how the Reverse Proxy handles CORS processing, see [cors-policu:<policy-
name>] stanza and Cross-Origin Resource Sharing (CORS) support.
Configuration Auditing
When you are managing API Access Control resource servers, resources, or resource access policies there
are a number of IBM Security Verify Access operations that are performed internally.
A log file is used to audit the type of operation and who it was performed by. This file is located in the
application log files directory /isam_runtime/policy_server/api_access_control.log.
The following is an example of a log entry. It shows:
• The date and time the operation was performed.
• The name of the LMI user that performed the operation (admin).
• As this is a pdadmin operation the name of the IBM Security Verify Access user that ran the command
(sec_master).
• The actual command that was run.
304 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Storing the IBM Security Verify Access operations for managing
Access Control Policies
The IBM Security Verify Access administrator credentials are required for all of the API Access Control
configuration tasks. Rather than providing them for each task individually they need to instead be stored
once.
Procedure
1. In the appliance top menu, Web > API Access Control > Policies or Resources
Note:
• If the credentials are not already set, a dialog box is shown prompting for the username and
password. Proceed to Step 3.
• If the credentials are already set and need to be updated, proceed to Step 2.
2. Click the Set Credentials button on the toolbar to launch the dialog box.
3. Enter the username and password.
4. Optional: Enter the domain.
Note: If not specified, the domain is set to Default.
5. Click Save.
Note: The credentials are stored in memory for the life of the API Access Control servlet. The
password is obfuscated.
Procedure
1. Use the API Access Control page:
a) From the appliance dashboard, select Web > API Access Control > Resources, Policies or CORS
Policies.
b) Click the Logging button in the toolbar to view the list of internal Verify Access operations that have
been run.
2. Use the Application Log Files page:
a) From the appliance dashboard, select Monitor > Application Log Files
b) In the tree open isam_runtime > policy_server.
c) Select the api_access_control.log file.
d) Click View to see the list of internal Verify Access operations that have been run.
Procedure
1. In the appliance top menu, Web > API Access Control > Policies
2. Click Add.
A dialog box is displayed prompting for policy details.
3. Enter the name for the new policy in the Name field.
4. Add any new groups to the policy criteria by clicking the Add button in the groups toolbar.
A new dialog box is shown.
a. Select the new group from the drop-down list of all available groups.
b. Click Save.
5. Click the Remove button to remove any groups by selecting the group in the groups list.
6. Add any new attributes to the policy criteria by clicking the Add button is the attributes toolbar.
A new dialog is shown.
a. Enter the attribute name in the Name field.
b. Enter the attribute value in the Value field
c. Multiple attributes can be combined together as a single attribute definition. They are combined
using an OR condition.
i) To add more attributes click the Add button.
ii) To delete an attribute click the Delete button.
d. Once the attribute definition is correct, click the Save button.
7. Click the Remove button to remove any attributes by selecting the attribute in the attribute grids.
8. Click Save.
Note:
• For the policy to allow access the user must be in at least one of the groups.
• For the policy to allow access all of the separate attribute definitions must be met.
• To view a list of all of the internal Verify Access operations that are run to create a new policy see
the api_access_control.log as described in “Auditing the Verify Access operations that are
performed when managing API Access Control components” on page 305.
Procedure
1. In the appliance top menu, Web > API Access Control > Policies
2. Select the policy to edit from the list of displayed policies and click Edit.
3. Enter the name for the new policy in the Name field.
4. Add any new groups to the policy criteria by clicking the Add button in the groups toolbar.
A new dialog box is shown.
a. Select the new group from the drop-down list of all available groups.
b. Click Save.
5. Click the Remove button to remove any groups by selecting the group in the groups list.
306 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
6. Add any new attributes to the policy criteria by clicking the Add button is the attributes toolbar.
A new dialog is shown.
a. Enter the attribute name in the Name field.
b. Enter the attribute value in the Value field
c. Multiple attributes can be combined together as a single attribute definition. They are combined
using an OR condition.
i) To add more attributes click the Add button.
ii) To delete an attribute click the Delete button.
d. Once the attribute definition is correct, click the Save button.
7. Click the Remove button to remove any attributes by selecting the attribute in the attribute grids.
8. Click Save.
Note:
• For the policy to allow access the user must be in at least one of the groups.
• For the policy to allow access all of the separate attribute definitions must be met.
• To view a list of all of the internal Verify Access operations that are run to create a new policy see
the api_access_control.log as described in “Auditing the Verify Access operations that are
performed when managing API Access Control components” on page 305.
Procedure
1. In the appliance top menu, Web > API Access Control > Policies
2. To delete all existing policies, follow the steps:
a) Select all policies or select no policies.
b) Click the Delete button.
3. To delete a selection of policies, follow the steps:
a) Select the policies to delete.
b) Click the Delete button.
Note:
• Deletion of a policy deletes the ACL and POP that is associated with the policy and removes all
resource attachments.
• To view a list of all of the internal Verify Access operations that are run to create a new policy see
the api_access_control.log as described in “Auditing the Verify Access operations that are
performed when managing API Access Control components” on page 305.
Resource Servers
This section describes the procedures to manage resource servers.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on
page 305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Click Add.
A dialog box is displayed prompting for the resource server details.
5. In the API Host tab enter the details for the API host server.
a) Enter the server details by using the basic or advanced data.
For Basic Data, click the Basic Radio button
i) Enter the path prefix in the Path Prefix field. This becomes the standard junction point to
the server.
ii) Enter a user friendly description for this resource server in the Description field.
iii) Enter the hostname or IP address for this resource server in the Server field.
iv) Enter the port for this resource server in the Port field.
v) If SSL is required check the SSL checkbox, otherwise leave it unchecked.
vi) After the server and port are entered optionally, click the Load Key button to load the CA
certificate from the server into the reverse proxy keyfile.
vii) For server authentication data click None if not required.
viii) For server authentication data, click Client Certificate for certificate authentication and
select the certificate from the drop-down list.
ix) For server authentication data, click Basic Authentication for basic authentication and
enter the username and password
For Advanced Data, click the Advanced Radio button
i) Select the Standard junction radio button to create a new standard junction.
ii) Select the Virtual junction radio button to create a new virtual junction.
iii) Click the Create button. This changes the dialog box to allow the advanced junction data to
be entered. See “Creating virtual junctions” on page 239 or “Creating standard junctions”
on page 240.
iv) Once all the values are entered, click OK to return to the previous dialog box.
Note: At this stage the advanced junction is not yet created. Values can be changed by clicking
Create on the API Host tab again.
6. In the Authentication tab enter the details for how the OAuth token is validated.
a) To use the existing reverse proxy configuration select the Current Reverse Proxy Authentication
radio button.
b) To use an external OAuth introspection endpoint select the OAuth Introspection radio button and
enter the details.
i) Enter the URL for the introspection endpoint in the Introspection URL field.
308 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
ii) After the URL is entered optionally, click the Load Key button to load the CA certificate from
the endpoint into the reverse proxy keyfile.
iii) Choose the method by which the authentication data is presented to the introspection
endpoint by selecting either Basic Authentication or POST parameter from the drop-down list.
iv) If the authentication data is client ID and/or client secret, click the Client Credentials radio
button and enter the Client Id and/or Client secret.
v) If the authentication data is a client ID header name, select the HTTP Header and enter the
Header Name.
vi) If the mapped identity must correspond to an existing Verify Access identity, select the OAuth
Identity must correspond to a known Verify Access identity radio button. If the mapped
identity is not required to correspond to an existing Verify Access identity, select OAuth
Identity does not need to correspond to a known Verify Access identity radio button.
vii) To add a new Introspection attribute definition, click the Add button in the Introspection
Response Attributes toolbar.
a) Choose whether this definition is to include or not include this attribute in the response.
b) Enter the Attribute name.
c) Click OK.
viii) Click Delete to remove an Introspection attribute definition.
ix) Click Move Up to move an attribute definition up in the ordered list.
7. In the policy tab select the policy that is to be attached to this resource server.
a) Use the parent policy and select the default Verify Access Policy radio button. Do not attach any
policy directly.
b) Click the No Access Permitted (disabled) radio button to not allow access.
c) Click the Unauthenticated Access Allowed radio button to allow unauthenticated access.
d) Click the Any Authenticated radio button to allow any authenticated access.
e) Click the Custom radio button to use a custom Access Control Policy. Select the custom policy
name form the drop-down list.
8. In the Response tab, set any static response headers to Create.
a) Click Add to add a new response header.
i) In the dialog box, select the Header Name or enter a new value in the Header Name field.
ii) Enter the header value.
iii) Click Save.
b) Click Delete to delete a response header from the header list.
9. In the new Identity tab, set the JWT configuration:
a) Check the Enable JWT check-box to enable JWT generation.
b) Specify the HTTP header name for the generated JWT in the Header Name field.
c) Select the certificate that is used to sign the generated JWT from the Certificate dropddown. This
dropddown is populated with the available personal certificates from either:
i) The keystore configured in the jct-cert-keyfile entry of the junction stanza in the reverse
proxy configuration file.
ii) If the jct-cert-keyfile entry is not configured, the keystore configured in the webseal-
cert-keyfile entry of the ssl stanza in the reverse proxy configuration file.
d) Set the list of claims to add to the generated JWT by using the toolbar for the claims table.
i) Click the Add button to create a new claim.
a) Click the Literal claim radio button if the claim is a literal text value.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. Click the icon next to the Reverse Proxy instance that holds the Resource Server.
These are the root level objects in the tree.
3. Select the resource server to modify.
4. Click Edit.
5. The API Host tab only allows the host server to be edited in advanced mode. If any of the data needs
to be edited, click the Edit button.
This changes the dialog box to allow the advanced junction data to be entered. See “Creating virtual
junctions” on page 239 or “Creating standard junctions” on page 240.
6. In the Authentication tab enter the details for how the OAuth token is validated.
a) To use the existing reverse proxy configuration select the Current Reverse Proxy Authentication
radio button.
b) To use an external OAuth introspection endpoint select the OAuth Introspection radio button and
enter the details.
i) Enter the URL for the introspection endpoint in the Introspection URL field.
ii) After the URL is entered optionally, click the Load Key button to load the CA certificate from
the endpoint into the reverse proxy keyfile.
iii) Choose the method by which the authentication data is presented to the introspection
endpoint by selecting either Basic Authentication or POST parameter from the drop-down list.
310 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
iv) If the authentication data is client ID and/or client secret, click the Client Credentials radio
button and enter the Client Id and/or Client secret.
v) If the authentication data is a client ID header name, select the HTTP Header and enter the
Header Name.
vi) If the mapped identity must correspond to an existing Verify Access identity, select the OAuth
Identity must correspond to a known Verify Access identity radio button. If the mapped
identity is not required to correspond to an existing Verify Access identity, select OAuth
Identity does not need to correspond to a known Verify Access identity radio button.
vii) To add a new Introspection attribute definition, click the Add button in the Introspection
Response Attributes toolbar.
a) Choose whether this definition is to include or not include this attribute in the response.
b) Enter the Attribute name.
c) Click OK.
viii) Click Delete to remove an Introspection attribute definition.
ix) Click Move Up to move an attribute definition up in the ordered list.
7. In the policy tab select the policy that is to be attached to this resource server.
a) Use the parent policy and select the default Verify Access Policy radio button. Do not attach any
policy directly.
b) Click the No Access Permitted (disabled) radio button to not allow access.
c) Click the Unauthenticated Access Allowed radio button to allow unauthenticated access.
d) Click the Any Authenticated radio button to allow any authenticated access.
e) Click the Custom radio button to use a custom Access Control Policy. Select the custom policy
name form the drop-down list.
8. In the Response tab, set any static response headers to Create.
a) Click Add to add a new response header.
i) In the dialog box, select the Header Name or enter a new value in the Header Name field.
ii) Enter the header value.
iii) Click Save.
b) Click Delete to delete a response header from the header list.
9. In the new Identity tab, set the JWT configuration:
a) Check the Enable JWT check-box to enable JWT generation.
b) Specify the HTTP header name for the generated JWT in the Header Name field.
c) Select the certificate that is used to sign the generated JWT from the Certificate dropddown. This
dropddown is populated with the available personal certificates from either:
i) The keystore configured in the jct-cert-keyfile entry of the junction stanza in the reverse
proxy configuration file.
ii) If the jct-cert-keyfile entry is not configured, the keystore configured in the webseal-
cert-keyfile entry of the ssl stanza in the reverse proxy configuration file.
d) Set the list of claims to add to the generated JWT by using the toolbar for the claims table.
i) Click the Add button to create a new claim.
a) Click the Literal claim radio button if the claim is a literal text value.
b) Click the Credential attribute claim radio button if the claim value is retrieved from a
credential attribute
c) Enter the value for a literal claim or the attribute name for a credential attribute claim. The
attribute name can include wildcard characters “*” or “?” if a pattern of attributes is to be
included in the generated JWT.
Procedure
1. From the appliance top menu, select Web > API Access Control > Resources.
2. Click the icon next to the Reverse Proxy instance that holds the Resource Server.
3. Select the resource server to delete.
4. Click the Delete button.
Procedure
1. From the appliance top menu, Web > API Access Control > Resources.
2. If all of the resource servers for a reverse proxy are to be exported, perform the following steps:
a) Select the reverse proxy instance. These are the root level objects in the tree.
b) Click Manage > Export.
This exports a zip file that contains the API Access Control configuration for the selected resource.
3. If a single resource server is to be exported, perform the following steps:
a) Click the icon next to the Reverse Proxy instance that holds the Resource Server. These are the root
level objects in the tree.
b) Select the resource server to export.
c) Click Manage > Export.
This exports a zip file that contains the API Access Control configuration for the selected resource.
Note: The exported configuration does not contain the junction data. It only contains the API Access
Control data that is associated with a junction. For example, OAuth authentication, policy, static
response headers, and junction specific management and error pages.
312 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Import the configuration of the resource server
To import the configuration of an existing Resource Server or servers with the local management
interface, use the API Access Control resources page.
Procedure
1. From the appliance top menu, select Web > API Access Control > Resources.
2. Select the reverse proxy instance. These are the root level objects in the tree.
3. Click Manage > Import.
4. In the dialog box, select the ZIP file containing the resource server data to import.
5. Click Import.
Note: The import does not create the resource server junction(s). For each resource server in the ZIP
file configuration an existing junction of the same name must exist in the target reverse proxy instance.
Procedure
1. From the appliance top menu, Web > API Access Control > Resources.
2. Select the reverse proxy instance. These are the root level objects in the tree.
3. Click Manage Management Root.
4. In the dialog box, browse to the type of page (error or management) and the locale.
In the local, there is a directory with the same name as the resource server.
5. Manage the files in the directory. See “Managing administration pages” on page 229.
Resources
This section describes the procedures to manage resources.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on
page 305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Select the required resource server to create the Resource.
5. Click Add.
A dialog box is displayed prompting for the resource server details.
6. In the Identification tab, enter the details for the new API resource.
a) Enter the user friendly description for this resource in the Name field.
b) Enter the path for this resource in the Path field.
What to do next
To view a list of the operations that are run to create a new resource, see the
api_access_control.log as described in “Auditing the Verify Access operations that are performed
when managing API Access Control components” on page 305.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
314 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on
page 305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Expand the resource server to show the list of existing resources.
5. Select the resource to modify.
6. Click Edit.
A dialog box is displayed showing the existing resource details.
7. In the Identification tab, enter the details for the new resource.
a) Enter the user friendly description for this resource in the Name field.
b) Add any path aliases that can be used for this resource to the list of URL aliases.
i) Click Add. A dialog is displayed prompting for the new alias.
ii) Enter the new alias.
Note: A wildcard character (*) might be used if required.
iii) Click Save.
c) Remove any path aliases by selecting the alias or aliases in the list and click the Delete button.
8. In the Policy tab, select the policy to be attached to this resource
a) Use the parent policy and select the default Verify Access Policy radio button. Do not attach any
policy directly. This will use the policy set in the resource server.
b) Click the No Access Permitted (disabled) radio button to not allow access.
c) Click the Unauthenticated Access Allowed radio button to allow unauthenticated access.
d) Click the Any Authenticated radio button to allow any authenticated access.
e) Click the Custom radio button to use a custom Access Control Policy.
f) Select the custom policy name form the drop-down list.
g) Select the rate limiting policy to be attached to this resource by using the Rate Limiting Policy
dropdown.
h) Select the CORS policy to be attached to this resource by using the CORS Policy dropdown.
9. In the Responses tab, set any static response headers to create.
a) Click Add to add a new response header.
i) In the dialog box, select the Header Name or enter a new value in the Header Name field.
ii) Enter the Header Value.
iii) Click Save.
b) To delete a response header select the header from the list and click Delete.
10. In the Documentation tab, enter the settings to allow the resource documentation to be returned.
a) Enter the content type header value. If a request to the resource contains this value in the
content-type header, the documentation file will be returned.
b) Select the documentation file from the drop-down list. If it does not exist click the upload
button to select and upload the file. These files can be managed by using “Manage the API
documentation root” on page 317.
11. Once all of the data are set, click Save to update the selected resource.
Note:
• The resource path and method can not be updated.
• To view a list of all of the internal IBM Security Verify Access operations that are run to create
a new resource see the api_access_control.log as described in “Auditing the Verify Access
operations that are performed when managing API Access Control components” on page 305.
Procedure
1. From the appliance top menu, select Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on page
305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Expand the resource server to show the list of existing resources.
5. Select the resource to modify.
6. Click Delete.
What to do next
To view a list of the IBM Security Verify Access operations that are run to create a new resource, see the
api_access_control.log as described in “Auditing the Verify Access operations that are performed
when managing API Access Control components” on page 305.
Procedure
1. From the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on page
305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Perform one of the following options:
If all of the resources for a reverse proxy are to be exported
a. Select the resource server.
b. Click Manage > Export. This exports a zip file containing the API Access Control configuration
for the resource server and all of its resources.
If a single resource is to be exported
a. Expand the Resource Server to show the existing resources.
b. Select the resource to export
c. Click Manage > Export. This exports a zip file containing the API Access Control configuration
for the selected resource.
316 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Import the configuration for a resource
To import the configuration of an existing resource or resources with the local management interface, use
the API Access Control resources page.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on page
305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Select the target resource.
5. Click Manage > Import.
What to do next
To view a list of the IBM Security Verify Access operations that are run to create a new resource, see the
api_access_control.log as described in “Auditing the Verify Access operations that are performed
when managing API Access Control components” on page 305.
Procedure
1. From the appliance top menu, select Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on page
305.
3. Select the reverse proxy instance.
These are the 2nd level objects in the tree.
4. Click Manage > API Documentation Root.
5. In the dialog, create, delete, rename, import files, and directories.
Procedure
1. In the appliance top menu, Web > API Access Control > CORS Policies
<protocol>://<hostname>:<port>
318 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Modifying an existing CORS policy
To modify an existing API Access Control CORS policy with the local management interface, use the API
Access Control CORS policies page.
Procedure
1. In the appliance top menu, Web > API Access Control > CORS Policies
2. Select the policy to modify from the list.
3. Click Edit.
A dialog box is displayed showing the current settings.
4. Enter the Access Control settings in the Access Control tab.
a) Select whether or not to set the Access-Control-Allow-Credentials header by using the
Allow Credentials checkbox.
b) Add any allowed origins to the policy by clicking the Add button in the Allowed Origins toolbar. A
new dialog box is shown.
i) Enter the new origin in the Name field. This value can be either “*” to allow all origins or an
individual origin of the form.
<protocol>://<hostname>:<port>
Procedure
1. In the appliance top menu, Web > API Access Control > CORS Policies.
2. To delete all existing policies, click Delete without selecting a policy from the list. This opens a
confirmation dialog.
a) Confirm the deletion by clicking the Delete button.
b) Cancel the deletion by clicking the Cancel button.
3. To delete one existing policy, select the policy to from the list and click the Delete button. This opens a
confirmation dialog.
a) Confirm the deletion by clicking the Delete button.
b) Cancel the deletion by clicking the Cancel button.
Note:
• Deleting a CORS policy results in all the API Access Control resource CORS policy references being
deleted also. This means the reverse proxy configuration files are updated to remove the CORS
policy stanzas for the deleted policies.
• To view a list of all of the internal Verify Access operations that are run to create a new CORS policy
see the api_access_control.log as described in “Auditing the Verify Access operations that are
performed when managing API Access Control components” on page 305.
320 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Accessibility features for Security Verify Access
Accessibility features assist users who have a disability, such as restricted mobility or limited vision, to
use information technology content successfully.
Accessibility features
Security Verify Access includes the following major accessibility features:
Accessibility features
Supports interfaces commonly used by screen readers. This feature applies to applications on Windows
operating systems only.
Supports customization of display attributes such as color, contrast, and font size.
Supports interfaces commonly used by screen magnifiers. This feature applies to applications on
Windows operating systems only.
Allows the user to access the interfaces without inducing seizures due to photosensitivity.
Security Verify Access uses the latest W3C Standard, WAI-ARIA 1.0 (http://www.w3.org/TR/wai-
aria/), to ensure compliance to US Section 508 (http://www.access-board.gov/guidelines-and-standards/
communications-and-it/about-the-section-508-standards/section-508-standards), and Web Content
Accessibility Guidelines (WCAG) 2.0 (http://www.w3.org/TR/WCAG20/). To take advantage of accessibility
features, use the latest release of your screen reader in combination with the latest web browser that is
supported by this product.
The Security Verify Access online product documentation in IBM Knowledge Center is enabled for
accessibility. The accessibility features of IBM Knowledge Center are described at https://www.ibm.com/
support/knowledgecenter/help?view=kc#accessibility.
Keyboard navigation
This product uses standard navigation keys.
Interface information
The Security Verify Access user interfaces do not have content that flashes 2 - 55 times per second.
The Security Verify Access web user interfaces and the IBM Knowledge Center rely on cascading style
sheets to render content properly and to provide a usable experience. The application provides an
equivalent way for low-vision users to use a user’s system display settings, including high-contrast mode.
You can control font size by using the device or web browser settings.
The Security Verify Access web user interface includes WAI-ARIA navigational landmarks that you can
use to quickly navigate to functional areas in the application.
Related accessibility information
In addition to standard IBM help desk and support websites, IBM has established a TTY telephone
service for use by deaf or hard of hearing customers to access sales and support services:
322 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
Index
A B
accessibility features for this product 321 backup 3, 176
account management 96
activation 26
administration 3
C
administration pages root CA paths 268, 272
directories 229 cable connections 5
files 229 certificates
advanced configuration files 247 databases
advanced tuning 97 adding description 111
advanced tuning parameters 202, 207 creating 112
alerts deleting 114
emails 105 exporting 113
remote syslog 106 importing 113
SNMP 104 listing 111
analysis 47 naming 113
appliances replicating 114
change commit process 39, 195 expiry 44
clusters 249 requests 117
disk space usage 3 signer 114
front-end load balancers 283, 284 changes
hardware 5 configuration 39, 195, 221
installation 6 debug levels 208
management 33, 37, 38 federated directory configuration 209
management interface 207 front-end load balancers 283
RESTful web services 38 passwords 207
runtime environment component 202 runtime configuration 199
setup wizard 25 CLI
snapshots 176 logging 279
tasks 5 clusters
updating 39, 195 data
application layer 285 loss 178
applications replication 167, 170
interface 50, 59 Distributed Session Cache 249
locale 108 external reference entity (ERE) 170
logs 51, 108 failure 169, 172
statistics 50 maintenance 176
applying changes 199 masters 165, 168, 177
architecture rules 176 nodes
authentication availability 177
enabling 242 identifiers 177
mutual 207 master nodes 172, 174, 176
paths 268, 272 registration 70, 174, 177
settings 273 rules 176
testing 268 services 168
authorization servers support 165
configuration files 247 command-line interface 25, 33
deleting 246 commit process 39, 195
editing 247 common tasks 25
log files 282 components
management 275 compress 275
restarting 247 flush intervals 275
starting 247 modifying statistics settings 233
stopping 247 rollover size 275
availability 168, 170, 177 runtime 199, 207
average response time statistics 237 trace levels 275
Index 323
configuration diagnostics (continued)
authentication 91 support files 103
changes 39, 195 disk space 43, 50, 279
databases 165, 168 distributed session cache
hardware appliances 5 cluster service 165, 168
host names 25 failover 169
initial 31 policy data 178
local management interface 174 Distributed Session Cache (DSC)
passwords 25 managing 249
restricted nodes 175 registered clients 293
system alerts 104 DN
configuration files local hierarchies 208
updating 277 domains
control management 251
access lists 208 names 286
FIPS setting 207 realms 268, 271
statistics 233 replica sets 293
tracing 275 TCP/IP 208
CPU graph 49 dscadmin command 295
creating clusters 69
E
D
email response objects 105
data embedded LDAP servers
administration 207 administration 207
files 280 log levels 208
flow management 207
appliance-wide 235 SSL interface 207
instance-specific 235 suffixes 208
instances 235 event logs 47
management 207 exiting 295
range 235 external reference entity (ERE) 168, 170
tracing 275 external user registries 207, 209
users 207
data loss 178
databases
F
LDAP keys 207 failure 168, 169, 172
date and time 88 federated directories 209
debugging federations
Java extension points 202 management 243
JVM 202 reverse proxy configuration 243, 244
log levels 208 file sizes 279
messages 287 files 103, 118
security log 287 firmware
default settings 56
certificates 209 updates 176
directories 229 first management interface 177
display 235 fix packs 56
passwords 207 flow data
ports 207 appliance-wide 235
rollover size 280 instance-specific 235
suffixes 208, 209 flush intervals 275
values 268, 269 front-end load balancers
default gateway 64 configuration 287
default route 64 functions 283
demote master 70 health status 237
details layers 285, 286
common log files 281 network termination 286
logging 279 persistence 285
replica set 293 scheduling 284
statistics components 233 servers 283
diagnostics FSSO
health 47 configuration 242
statistics 47
324 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
functionality 283 Kerberos (continued)
domains 271
keytab files 268, 273
G realms 270
geolocation data 165, 167, 169 settings 268
getting started 5 keytab files 268, 273
groups 96 KVM 8
gw_net.tuning.downdelay 97
gw_net.tuning.miimon 97 L
gw_net.tuning.updelay 97
gw_net.tuning.use_carrier 97 layer 7
gw_net.tuning.xmit_hash_policy 97 benefits 286
HTTP cookies 285
load balancing 285
H SSL proxy 287
hardware appliances 5, 25 SSL termination 286
headers 38 stickiness 285
health status 236, 237 LDAP
high availability 170, 237, 283 administration 207
hosts log levels 208
files 67 management 207
names 25 servers 207
HTTP headers SSL
identities 242 settings 209
requests 286 support 207
responses 286 suffixes 208
Hyper-V 10 LDAP PIP 111
LDAP policy information point 111
LDAP server 111
I license
agreement 25
IBM Security Access Manager
calculation 22
environments 283
metric tool 22
IBM Security Verify Access
updates 55
environment 275
listing
installation
file sizes 279
fix packs 56
names of log files 279
instances
session management sessions 293, 295
deleting 246
LMI
editing 247
appliance setup wizard 25
restarting 211, 247
cluster configuration 167
showing current state 233
commit process 39, 195
starting 211, 247
configure hardware appliances 5
stopping 211, 247
Kerberos configuration 268
unconfiguring 213
logging on 33, 37
intermediate files 103
restricted nodes 175
IP addresses 44, 177
reverse proxy management 211
supported browsers 33, 37
J load balancers
configuration 284, 287
Java front-end 283, 287
extension points 202 health status 237
junctions layer 7 286
graphs 237 layers 285
health status 236 network termination 286
standard 242 local management interface
virtual 242 cluster configuration 172, 174
JVM debugging 202 See also LMI
log files
K authorization 282
clearing 280
Kerberos exporting 279
CA paths 272 management 279
default values 269 names 279
Index 325
log files (continued) P
reverse proxy 281
statistics 233 packet tracing 68
viewing snippets 279 partitions 45, 50, 56
log levels password management 207
customizing 208 passwords 25
LDAP servers 208 patches 56
logging 279, 280 persistence 283, 285
logs policy servers
files 103, 106, 108 editing 276
response objects 106 management 199
LTPA keys primary masters 114, 165
files 242 Process Value Unit (PVU) report 22
product activation 26
promotion 70, 172
M
maintenance 176 Q
management
applications quaternary masters 165
logs 51 quitting 295
authentication 91
certificates
requests 117
R
signer 114 realms
SSL 96, 111 authentication 268, 272
file downloads 118 domains 268, 271
groups 96 management 270
hosts files 67 names 268
interface 59 properties 271
packet tracing 68 servers 268
settings redirection 64
secure 111 references
systems 55 cluster configuration 73
users 96 databases 80
master ERE 170 session cache 74
master nodes 70, 165 registration 70, 177
memory statistics 48 replica sets
metadata listing 293, 295
user registries 207 management 249
session termination 294
N showing 293
replicating SSL certificates 114, 167
network replication
settings 58, 287 syncing 208
termination 286 response objects
traffic 45 emails 105
nist.sp800-131a.strict 97 logs 106
nodes SNMP 104
clusters 165 restarting 107
failure 172 RESTful web services 38
promotion 70, 172 restricted nodes 175
restricted 175 reverse proxy
notifications 43, 104, 105 configuration 221
NTP servers 88 federation configuration 243, 244
graphs 235
health status 236
O instances
objects restarting 211
email alerts 105 showing current state 233
log alerts 106 starting 211
offline 107 stopping 211
OSI network model 285 unconfiguring 213
log files 281
326 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
reverse proxy (continued) sessions (continued)
management 211 information 249
throughput 235 listing 295
traffic 235 management 295
RHEV 9 management replicas 293
roles 165 persistence 285
rollover termination 294
compress 280 sets 293
files 275 settings
sizes 275, 280 appliances 25
root 50 configuration 102
rules 176 debug levels 208
runtime firmware 56
cluster services 168 Kerberos 268
components 199 management
configuration 202, 276 port 25
data 167, 178 network 58
databases 165, 169 policy 102
failure 169 secure 111
JVM debugging 202 snapshots 102
profiles 202 statistics 233
restarting 199 systems 88, 167
settings 170 setup 5, 25
starting 199 shutting down 107
stopping 199 signature files 70, 174
signer certificates 114
simple network management protocol (SNMP) 104
S snapshots 102
scheduling 284, 287 SNMP
secondary masters 165 configuring 108
Security Access Manager software
environments 283 support 275
security actions 237 SSL
Security Verify Access support 207
authorization servers 247 termination 286
editing tracing configuration file 276 SSL certificates
environments 275 adding description 111
external user registries 209 exporting 113
serial consoles 5 importing 113
servers management 96, 111
authorization naming 111, 113
deleting 246 replicating 114, 167
editing 247 signer certificates 114
log files 282 updating 96
restarting 247 viewing details 96
starting 247 SSL connections
stopping 247 configuring 111
trace files 275 stand-alone clusters 165
definition 283 standard junctions 242
LDAP 207 static routes
load-balanced 237 configuration 64
real 287 statistics
virtual 287 average response times 237
WebSEAL 242 control 233
services log files 233
health status 237 security actions 237
IP addresses 283 settings 233
layer 7 287 status column 167
load balancing 283 stickiness 283, 285
ports 283 storage 50
requests 283 suffix management 208
web 39, 195 support
sessions clusters 165
cache reference 74 files 103
Index 327
syslog 106 W
systems
alerts 104 web
events 47 content 237
notifications 43 servers
settings 55, 88, 167 principals 268
services 39, 195
Web Portal Manager 251
T Web Reverse Proxy
TCP configuration
header information 285 environments 283
layers 285 files 221
levels 287 inspections 237
temporary files 103 log files
terminal emulation 5 management 279
termination malicious requests 237
networks 286 management 229
sessions 294 servers 283, 286
tertiary masters 165 transaction logs 237
time zones 88 Web Security Gateway Appliance
trace reverse proxy log files 279
components 275 statistics 233
configuration files tracing 275
editing 247, 276 web services
updating 277 error responses 39
control 275 required headers 38
data 275 WebSEAL
files 275 instances
function calls 208 display 235
levels 275 servers 242
traffic sessions 285
reverse proxy 235
transaction logging components 237, 280
troubleshooting support files 103
tuning parameters 167
U
updates
changes 176
firmware 55, 56, 176
intrusion prevention 55
licensing 55
USB devices 279
user registries
embedded 207
external 209
log files 199
management 207
users
names 242
sessions 294, 295
V
virtual
IP addresses 283
junctions 242
servers 287
virtual appliances
installation 6, 8–10
tasks 6, 25
VMware 6
328 IBM Security Verify Access Version 10.0.6 June 2023: Administration topics
IBM®