10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.<br />

The<br />

client<br />

(browser)<br />

attempts<br />

to<br />

access<br />

a<br />

protected<br />

resource.<br />

The<br />

client<br />

request<br />

goes<br />

to<br />

a<br />

load<br />

balancer<br />

that<br />

controls<br />

access<br />

to<br />

the<br />

replicated<br />

<strong>WebSEAL</strong><br />

servers.<br />

2.<br />

The<br />

load<br />

balancer<br />

selects<br />

a<br />

target<br />

<strong>WebSEAL</strong><br />

server<br />

and<br />

<strong>for</strong>wards<br />

the<br />

user<br />

request.<br />

3.<br />

The<br />

client<br />

successfully<br />

authenticates<br />

to<br />

<strong>WebSEAL</strong><br />

using<br />

one<br />

of<br />

the<br />

supported<br />

authentication<br />

methods.<br />

4.<br />

<strong>WebSEAL</strong><br />

creates<br />

a<br />

failover<br />

authentication<br />

cookie<br />

that<br />

contains<br />

client<br />

authentication<br />

in<strong>for</strong>mation,<br />

and<br />

sends<br />

the<br />

cookie<br />

to<br />

the<br />

client.<br />

5.<br />

The<br />

client<br />

sends<br />

the<br />

cookie<br />

through<br />

the<br />

load<br />

balancer<br />

to<br />

<strong>WebSEAL</strong><br />

with<br />

each<br />

subsequent<br />

request.<br />

The<br />

<strong>WebSEAL</strong><br />

server<br />

processes<br />

each<br />

request.<br />

6.<br />

If<br />

the<br />

load<br />

balancer<br />

finds<br />

that<br />

the<br />

<strong>WebSEAL</strong><br />

server<br />

is<br />

not<br />

accessible,<br />

the<br />

client<br />

request<br />

is<br />

directed<br />

to<br />

another<br />

replicated<br />

<strong>WebSEAL</strong><br />

server.<br />

7.<br />

The<br />

replicated<br />

<strong>WebSEAL</strong><br />

server<br />

is<br />

configured<br />

to<br />

check<br />

<strong>for</strong><br />

the<br />

existence<br />

of<br />

a<br />

failover<br />

authentication<br />

cookie<br />

every<br />

time<br />

it<br />

attempts<br />

to<br />

authenticate<br />

a<br />

user.<br />

8.<br />

<strong>WebSEAL</strong><br />

uses<br />

the<br />

in<strong>for</strong>mation<br />

in<br />

the<br />

cookie<br />

to<br />

establish<br />

a<br />

session<br />

with<br />

the<br />

client,<br />

without<br />

requiring<br />

the<br />

client<br />

to<br />

manually<br />

log<br />

in<br />

again.<br />

The<br />

client’s<br />

session<br />

data<br />

and<br />

user<br />

credential<br />

are<br />

built,<br />

and<br />

the<br />

request<br />

<strong>for</strong><br />

the<br />

protected<br />

resource<br />

is<br />

processed.<br />

9.<br />

The<br />

change<br />

of<br />

session<br />

from<br />

one<br />

<strong>WebSEAL</strong><br />

server<br />

to<br />

another<br />

<strong>WebSEAL</strong><br />

server<br />

is<br />

transparent<br />

to<br />

the<br />

client.<br />

Because<br />

the<br />

<strong>WebSEAL</strong><br />

servers<br />

contain<br />

identical<br />

resources,<br />

the<br />

client<br />

session<br />

continues<br />

uninterrupted.<br />

Note:<br />

For<br />

more<br />

in<strong>for</strong>mation<br />

on<br />

replication<br />

of<br />

<strong>WebSEAL</strong><br />

servers,<br />

see<br />

“Replicated<br />

front-end<br />

<strong>WebSEAL</strong><br />

servers”<br />

on<br />

page<br />

58.<br />

Failover<br />

authentication<br />

library<br />

<strong>WebSEAL</strong><br />

provides<br />

a<br />

built-in<br />

failover<br />

authentication<br />

shared<br />

library<br />

<strong>for</strong><br />

each<br />

of<br />

the<br />

supported<br />

authentication<br />

methods.<br />

Each<br />

failover<br />

shared<br />

library<br />

mimics<br />

the<br />

shared<br />

library<br />

<strong>for</strong><br />

the<br />

corresponding<br />

authentication<br />

method<br />

and,<br />

additionally,<br />

recovers<br />

any<br />

extended<br />

attributes<br />

that<br />

were<br />

originally<br />

placed<br />

in<br />

the<br />

user’s<br />

credential.<br />

When<br />

a<br />

failover<br />

authentication<br />

event<br />

occurs,<br />

<strong>WebSEAL</strong><br />

calls<br />

the<br />

failover<br />

authentication<br />

library<br />

that<br />

matches<br />

the<br />

last<br />

authentication<br />

method<br />

used<br />

by<br />

the<br />

user<br />

be<strong>for</strong>e<br />

the<br />

original<br />

<strong>WebSEAL</strong><br />

server<br />

failed.<br />

<strong>WebSEAL</strong><br />

supplies<br />

failover<br />

authentication<br />

function<br />

<strong>for</strong><br />

the<br />

following<br />

authentication<br />

methods:<br />

v<br />

Basic<br />

or<br />

<strong>for</strong>ms<br />

authentication<br />

(also<br />

known<br />

as<br />

password<br />

authentication)<br />

v<br />

Token<br />

card<br />

authentication<br />

v<br />

Certificate<br />

authentication<br />

v<br />

HTTP<br />

request<br />

authentication<br />

v<br />

Cross-domain<br />

single<br />

signon<br />

(CDSSO)<br />

v<br />

Kerberos<br />

authentication<br />

(SPNEGO)<br />

<strong>WebSEAL</strong><br />

supplies<br />

one<br />

standard<br />

failover<br />

shared<br />

library<br />

that<br />

functions<br />

<strong>for</strong><br />

all<br />

the<br />

above<br />

authentication<br />

methods.<br />

This<br />

library<br />

is<br />

called<br />

libfailoverauthn<br />

on<br />

UNIX<br />

systems,<br />

and<br />

failoverauthn<br />

on<br />

Windows.<br />

Note:<br />

Alternatively,<br />

you<br />

can<br />

supply<br />

a<br />

custom<br />

CDAS<br />

library<br />

that<br />

provides<br />

specific<br />

authentication<br />

capabilities<br />

required<br />

by<br />

your<br />

environment.<br />

For<br />

example,<br />

a<br />

<strong>WebSEAL</strong><br />

server<br />

can<br />

be<br />

configured<br />

to<br />

support<br />

<strong>for</strong>ms<br />

authentication<br />

and<br />

failover<br />

authentication.<br />

When<br />

<strong>WebSEAL</strong><br />

starts,<br />

both<br />

the<br />

<strong>for</strong>ms<br />

authentication<br />

shared<br />

library<br />

and<br />

the<br />

″failover-<strong>for</strong>ms″<br />

authentication<br />

library<br />

are<br />

loaded.<br />

The<br />

user<br />

Chapter<br />

6.<br />

Authentication<br />

167

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!