10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

This<br />

group<br />

is<br />

automatically<br />

created<br />

by<br />

default<br />

during<br />

installation<br />

of<br />

a<br />

<strong>WebSEAL</strong><br />

server.<br />

The<br />

following<br />

identities<br />

are<br />

automatically<br />

added<br />

to<br />

this<br />

group<br />

during<br />

installation:<br />

v<br />

sec_master<br />

—<br />

the<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

administrator<br />

v<br />

acld<br />

–<br />

the<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

authorization<br />

server<br />

daemon<br />

v<br />

webseald<br />

—<br />

the<br />

<strong>WebSEAL</strong><br />

daemon<br />

<strong>WebSEAL</strong><br />

administrators<br />

should<br />

not<br />

add<br />

any<br />

users<br />

to<br />

the<br />

securitygroup<br />

group.<br />

To<br />

control<br />

user<br />

access<br />

to<br />

switch<br />

user,<br />

use<br />

either<br />

su-admins<br />

or<br />

su-excluded.<br />

Part<br />

2:<br />

Configuring<br />

switch<br />

user<br />

authentication<br />

mechanisms<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

supplies<br />

a<br />

single,<br />

built-in,<br />

switch<br />

user<br />

library<br />

that<br />

implements<br />

the<br />

switch<br />

user<br />

authentication<br />

mechanism.<br />

The<br />

switch<br />

user<br />

library<br />

differs<br />

from<br />

the<br />

standard<br />

authentication<br />

libraries.<br />

The<br />

library<br />

specifies<br />

an<br />

authentication<br />

mechanism<br />

that<br />

takes<br />

a<br />

supplied<br />

user<br />

identity<br />

and<br />

returns<br />

a<br />

valid<br />

credential<br />

<strong>for</strong><br />

that<br />

user<br />

without<br />

requiring<br />

the<br />

user<br />

password<br />

<strong>for</strong><br />

input.<br />

The<br />

built-in<br />

switch<br />

user<br />

shared<br />

library<br />

provided<br />

with<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

is<br />

called<br />

libsuauthn<br />

(on<br />

UNIX<br />

systems)<br />

and<br />

suauthn<br />

(on<br />

Windows<br />

systems).<br />

The<br />

plat<strong>for</strong>m-specific<br />

shared<br />

library<br />

file<br />

names<br />

are:<br />

Solaris<br />

Operating<br />

Environment<br />

(Solaris)<br />

libsuauthn.so<br />

AIX<br />

libsuauthn.a<br />

HP-UX<br />

libsuauthn.sl<br />

Windows<br />

suauthn.dll<br />

The<br />

built-in<br />

library<br />

supports<br />

the<br />

following<br />

authentication<br />

mechanisms:<br />

v<br />

su-password<br />

v<br />

su-token-card<br />

v<br />

su-certificate<br />

v<br />

su-http-request<br />

v<br />

su-cdsso<br />

v<br />

su-kerberosv5<br />

The<br />

authentication<br />

mechanisms<br />

are<br />

specified<br />

in<br />

the<br />

[authentication-mechanisms]<br />

stanza<br />

of<br />

the<br />

<strong>WebSEAL</strong><br />

configuration<br />

file.<br />

There<br />

is<br />

a<br />

separate<br />

entry<br />

<strong>for</strong><br />

each<br />

supported<br />

authentication<br />

mechanism.<br />

By<br />

default,<br />

all<br />

of<br />

the<br />

switch<br />

user<br />

authentication<br />

mechanisms<br />

are<br />

disabled<br />

in<br />

the<br />

configuration<br />

file.<br />

For<br />

example:<br />

[authentication-mechanisms]<br />

#su-password<br />

=<br />

<br />

#su-token-card<br />

=<br />

<br />

#su-certificate<br />

=<br />

<br />

#su-http-request<br />

=<br />

<br />

#su-cdsso<br />

=<br />

<br />

#su-kerberosv5<br />

=<br />

<br />

The<br />

configuration<br />

steps<br />

<strong>for</strong><br />

enabling<br />

authentication<br />

consist<br />

primarily<br />

of<br />

editing<br />

the<br />

appropriate<br />

configuration<br />

file<br />

name=value<br />

entries.<br />

However,<br />

when<br />

the<br />

<strong>WebSEAL</strong><br />

deployment<br />

supports<br />

more<br />

than<br />

one<br />

authentication<br />

mechanism,<br />

and<br />

the<br />

administrator<br />

wants<br />

to<br />

use<br />

switch<br />

user<br />

functions<br />

<strong>for</strong><br />

more<br />

than<br />

one<br />

type<br />

of<br />

Chapter<br />

7.<br />

Advanced<br />

<strong>WebSEAL</strong><br />

authentication<br />

191

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!