10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring<br />

reauthentication<br />

based<br />

on<br />

session<br />

inactivity<br />

policy<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

<strong>WebSEAL</strong><br />

can<br />

<strong>for</strong>ce<br />

a<br />

user<br />

to<br />

per<strong>for</strong>m<br />

an<br />

additional<br />

login<br />

(reauthentication)<br />

to<br />

ensure<br />

that<br />

a<br />

user<br />

accessing<br />

a<br />

protected<br />

resource<br />

is<br />

the<br />

same<br />

person<br />

who<br />

initially<br />

authenticated<br />

at<br />

the<br />

start<br />

of<br />

the<br />

session.<br />

Reauthentication<br />

can<br />

be<br />

activated<br />

by<br />

a<br />

Protected<br />

Object<br />

Policy<br />

(POP)<br />

on<br />

the<br />

protected<br />

object<br />

or<br />

by<br />

expiration<br />

of<br />

the<br />

inactivity<br />

timeout<br />

value<br />

<strong>for</strong><br />

a<br />

<strong>WebSEAL</strong><br />

session<br />

cache<br />

entry.<br />

This<br />

section<br />

discusses<br />

reauthentication<br />

based<br />

on<br />

the<br />

expiration<br />

of<br />

the<br />

inactivity<br />

timeout<br />

value<br />

<strong>for</strong><br />

a<br />

<strong>WebSEAL</strong><br />

session<br />

cache<br />

entry.<br />

Background<br />

material<br />

on<br />

the<br />

<strong>WebSEAL</strong><br />

session<br />

cache<br />

is<br />

provided<br />

in<br />

“The<br />

<strong>WebSEAL</strong><br />

session/credentials<br />

cache<br />

structure”<br />

on<br />

page<br />

10.<br />

Conditions<br />

affecting<br />

inactivity<br />

reauthentication<br />

Forced<br />

reauthentication<br />

provides<br />

additional<br />

protection<br />

<strong>for</strong><br />

sensitive<br />

resources<br />

in<br />

the<br />

secure<br />

domain.<br />

Reauthentication<br />

based<br />

on<br />

session<br />

inactivity<br />

policy<br />

is<br />

enabled<br />

by<br />

a<br />

configuration<br />

parameter<br />

and<br />

is<br />

activated<br />

by<br />

the<br />

expiration<br />

of<br />

the<br />

inactivity<br />

timeout<br />

value<br />

of<br />

the<br />

session<br />

cache<br />

entry.<br />

Reauthentication<br />

is<br />

supported<br />

by<br />

the<br />

following<br />

supported<br />

<strong>WebSEAL</strong><br />

authentication<br />

methods:<br />

v<br />

Forms<br />

(user<br />

name<br />

and<br />

password)<br />

authentication<br />

v<br />

Token<br />

authentication<br />

In<br />

addition,<br />

a<br />

custom<br />

user<br />

name/password<br />

CDAS<br />

can<br />

be<br />

written<br />

to<br />

support<br />

reauthentication.<br />

Reauthentication<br />

assumes<br />

the<br />

user<br />

has<br />

initially<br />

logged<br />

in<br />

to<br />

the<br />

secure<br />

domain<br />

and<br />

that<br />

a<br />

valid<br />

credential<br />

exists<br />

<strong>for</strong><br />

the<br />

user.<br />

During<br />

reauthentication,<br />

the<br />

user<br />

must<br />

log<br />

in<br />

using<br />

the<br />

same<br />

identity<br />

that<br />

generated<br />

the<br />

existing<br />

credential.<br />

<strong>WebSEAL</strong><br />

preserves<br />

the<br />

user’s<br />

original<br />

session<br />

in<strong>for</strong>mation,<br />

including<br />

the<br />

credential,<br />

during<br />

reauthentication.<br />

The<br />

credential<br />

is<br />

not<br />

replaced<br />

during<br />

reauthentication.<br />

During<br />

reauthentication,<br />

<strong>WebSEAL</strong><br />

also<br />

caches<br />

the<br />

request<br />

that<br />

prompted<br />

the<br />

reauthentication.<br />

After<br />

successful<br />

reauthentication,<br />

the<br />

cached<br />

data<br />

is<br />

used<br />

to<br />

rebuild<br />

the<br />

request.<br />

See<br />

“Server-side<br />

request<br />

caching”<br />

on<br />

page<br />

200.<br />

A<br />

user’s<br />

session<br />

is<br />

normally<br />

regulated<br />

by<br />

a<br />

session<br />

inactivity<br />

value<br />

and<br />

a<br />

session<br />

lifetime<br />

value.<br />

When<br />

<strong>WebSEAL</strong><br />

is<br />

configured<br />

<strong>for</strong><br />

reauthentication<br />

based<br />

on<br />

session<br />

inactivity,<br />

the<br />

user’s<br />

session<br />

cache<br />

entry<br />

is<br />

″flagged″<br />

whenever<br />

the<br />

session<br />

inactivity<br />

timeout<br />

value<br />

expires.<br />

The<br />

session<br />

cache<br />

entry<br />

(containing<br />

the<br />

user<br />

credential)<br />

is<br />

not<br />

removed.<br />

The<br />

user<br />

can<br />

proceed<br />

to<br />

access<br />

unprotected<br />

resources.<br />

However,<br />

if<br />

the<br />

user<br />

requests<br />

a<br />

protected<br />

resource,<br />

<strong>WebSEAL</strong><br />

sends<br />

a<br />

login<br />

prompt.<br />

After<br />

successful<br />

reauthentication,<br />

the<br />

inactive<br />

session<br />

″flag″<br />

is<br />

removed<br />

and<br />

the<br />

inactivity<br />

timer<br />

is<br />

reset.<br />

If<br />

reauthentication<br />

fails,<br />

<strong>WebSEAL</strong><br />

returns<br />

the<br />

login<br />

prompt<br />

again.<br />

The<br />

session<br />

cache<br />

entry<br />

remains<br />

″flagged″<br />

and<br />

the<br />

user<br />

can<br />

proceed<br />

as<br />

unauthenticated<br />

until<br />

the<br />

session<br />

cache<br />

entry<br />

lifetime<br />

value<br />

expires.<br />

If<br />

reauthentication<br />

succeeds,<br />

but<br />

the<br />

ACL<br />

check<br />

fails<br />

<strong>for</strong><br />

that<br />

resource,<br />

a<br />

403<br />

″Forbidden″<br />

is<br />

returned<br />

and<br />

the<br />

user<br />

is<br />

denied<br />

access<br />

to<br />

the<br />

requested<br />

resource.<br />

208<br />

<strong>IBM</strong><br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

<strong>for</strong><br />

e-<strong>business</strong>:<br />

<strong>WebSEAL</strong><br />

<strong>Administration</strong><br />

Guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!