10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[session]<br />

timeout<br />

inactive-timeout<br />

[ssl]<br />

ssl-v2-timeout<br />

ssl-v3-timeout<br />

When<br />

you<br />

use<br />

cookies<br />

to<br />

maintain<br />

session<br />

state,<br />

the<br />

cookie<br />

is<br />

sent<br />

to<br />

the<br />

browser<br />

only<br />

once,<br />

following<br />

a<br />

successful<br />

login.<br />

However,<br />

some<br />

browsers<br />

en<strong>for</strong>ce<br />

a<br />

limit<br />

on<br />

the<br />

number<br />

of<br />

in-memory<br />

cookies<br />

they<br />

can<br />

store<br />

concurrently.<br />

In<br />

some<br />

environments,<br />

applications<br />

can<br />

place<br />

a<br />

large<br />

number<br />

of<br />

in-memory<br />

cookies<br />

per<br />

domain<br />

on<br />

client<br />

systems.<br />

In<br />

this<br />

case,<br />

any<br />

configured<br />

<strong>WebSEAL</strong><br />

session<br />

cookie<br />

or<br />

failover<br />

cookie<br />

can<br />

be<br />

easily<br />

replaced<br />

by<br />

another<br />

cookie.<br />

When<br />

you<br />

configure<br />

<strong>WebSEAL</strong><br />

to<br />

use<br />

session<br />

cookies<br />

(and<br />

perhaps<br />

failover<br />

cookies),<br />

you<br />

can<br />

set<br />

the<br />

resend-webseal-cookies<br />

parameter,<br />

located<br />

in<br />

the<br />

[session]<br />

stanza<br />

of<br />

the<br />

<strong>WebSEAL</strong><br />

configuration<br />

file,<br />

to<br />

have<br />

<strong>WebSEAL</strong><br />

send<br />

the<br />

session<br />

cookie<br />

and<br />

the<br />

failover<br />

cookie<br />

to<br />

the<br />

browser<br />

with<br />

every<br />

response.<br />

This<br />

action<br />

helps<br />

to<br />

ensure<br />

that<br />

the<br />

session<br />

cookie<br />

and<br />

the<br />

failover<br />

cookie<br />

remain<br />

in<br />

the<br />

browser<br />

memory.<br />

The<br />

resend-webseal-cookies<br />

parameter<br />

has<br />

a<br />

default<br />

setting<br />

of<br />

″no″:<br />

[session]<br />

resend-webseal-cookies<br />

=<br />

no<br />

Change<br />

the<br />

default<br />

setting<br />

to<br />

″yes″<br />

to<br />

send<br />

<strong>WebSEAL</strong><br />

session<br />

cookies<br />

and<br />

failover<br />

cookies<br />

with<br />

every<br />

response.<br />

Enabling<br />

and<br />

disabling<br />

same<br />

sessions<br />

You<br />

can<br />

configure<br />

<strong>WebSEAL</strong><br />

to<br />

use<br />

the<br />

same<br />

session<br />

ID<br />

data<br />

when<br />

a<br />

client<br />

logs<br />

in<br />

over<br />

one<br />

type<br />

of<br />

transport<br />

(HTTP,<br />

<strong>for</strong><br />

example),<br />

disconnects,<br />

and<br />

re-logs<br />

in<br />

over<br />

another<br />

type<br />

of<br />

transport<br />

(HTTPS,<br />

<strong>for</strong><br />

example).<br />

The<br />

use-same-session<br />

parameter,<br />

located<br />

in<br />

the<br />

[session]<br />

stanza<br />

of<br />

the<br />

<strong>WebSEAL</strong><br />

configuration<br />

file,<br />

enables<br />

and<br />

disables<br />

the<br />

recognition<br />

of<br />

the<br />

same<br />

session<br />

ID<br />

data.<br />

By<br />

default,<br />

this<br />

parameter<br />

is<br />

set<br />

to<br />

″no″:<br />

[session]<br />

use-same-session<br />

=<br />

no<br />

A<br />

″yes″<br />

configuration<br />

setting<br />

<strong>for</strong><br />

this<br />

parameter<br />

results<br />

in<br />

the<br />

following<br />

conditions:<br />

v<br />

Session<br />

cookies<br />

are<br />

used<br />

to<br />

identify<br />

the<br />

following<br />

client<br />

types<br />

<strong>for</strong><br />

subsequent<br />

logins<br />

over<br />

another<br />

transport:<br />

–<br />

Failover<br />

cookies<br />

–<br />

Client-side<br />

certificates<br />

–<br />

CDSSO<br />

ID<br />

token<br />

–<br />

Token<br />

passcode<br />

–<br />

Forms<br />

username<br />

and<br />

password<br />

–<br />

basic<br />

authentication<br />

v<br />

The<br />

HTTP<br />

header<br />

is<br />

used<br />

<strong>for</strong><br />

clients<br />

accessing<br />

with<br />

HTTP<br />

headers.<br />

v<br />

The<br />

IP<br />

address<br />

is<br />

used<br />

<strong>for</strong><br />

clients<br />

accessing<br />

with<br />

IP<br />

addresses.<br />

v<br />

The<br />

ssl-id-sessions<br />

configuration<br />

is<br />

ignored;<br />

the<br />

resulting<br />

behavior<br />

is<br />

the<br />

same<br />

as<br />

if<br />

ssl-id-sessions<br />

were<br />

set<br />

to<br />

“no”.<br />

This<br />

logic<br />

is<br />

important<br />

because<br />

HTTP<br />

clients<br />

do<br />

not<br />

have<br />

an<br />

SSL<br />

session<br />

ID<br />

available<br />

as<br />

session<br />

data.<br />

Chapter<br />

6.<br />

Authentication<br />

137

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!