10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

However,<br />

the<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

Web<br />

Plug-in<br />

<strong>for</strong><br />

IIS<br />

supports<br />

NTLM.<br />

<strong>WebSEAL</strong><br />

can<br />

be<br />

deployed<br />

in<br />

an<br />

e-community<br />

single<br />

signon<br />

solution<br />

that<br />

uses<br />

the<br />

Web<br />

Plug-in<br />

<strong>for</strong><br />

IIS<br />

to<br />

accomplish<br />

SPNEGO<br />

authentication<br />

using<br />

NTLM.<br />

v<br />

Using<br />

SPNEGO<br />

simultaneously<br />

with<br />

other<br />

authentication<br />

methods<br />

does<br />

not<br />

work<br />

with<br />

Netscape<br />

4.7<br />

Windows<br />

desktop<br />

single<br />

sign-on<br />

configuration<br />

This<br />

section<br />

contains<br />

the<br />

configuration<br />

steps<br />

that<br />

must<br />

be<br />

completed<br />

to<br />

implement<br />

Windows<br />

desktop<br />

single<br />

signon<br />

using<br />

SPNEGO<br />

authentication<br />

with<br />

<strong>WebSEAL</strong>.<br />

Not<br />

all<br />

steps<br />

are<br />

required<br />

on<br />

each<br />

plat<strong>for</strong>m.<br />

To<br />

configure<br />

SPNEGO<br />

authentication,<br />

complete<br />

each<br />

of<br />

the<br />

following<br />

steps:<br />

v<br />

“Step<br />

1:<br />

Configure<br />

<strong>WebSEAL</strong><br />

server<br />

into<br />

Active<br />

Directory<br />

domain”<br />

v<br />

“Step<br />

2:<br />

Map<br />

Kerberos<br />

principal<br />

to<br />

Active<br />

Directory<br />

user”<br />

on<br />

page<br />

238<br />

v<br />

“Step<br />

3:<br />

Install<br />

Kerberos<br />

runtime<br />

client<br />

(UNIX<br />

only)”<br />

on<br />

page<br />

240<br />

v<br />

“Step<br />

4:<br />

Configure<br />

Kerberos<br />

client<br />

(UNIX<br />

only)”<br />

on<br />

page<br />

240<br />

v<br />

“Step<br />

5:<br />

Verify<br />

authentication<br />

of<br />

Web<br />

server<br />

principal<br />

(UNIX<br />

only)”<br />

on<br />

page<br />

241<br />

v<br />

“Step<br />

6:<br />

Verify<br />

<strong>WebSEAL</strong><br />

authentication<br />

using<br />

the<br />

keytab<br />

file<br />

(UNIX<br />

only)”<br />

on<br />

page<br />

242<br />

v<br />

“Step<br />

7:<br />

Enable<br />

SPNEGO<br />

<strong>for</strong><br />

<strong>WebSEAL</strong>”<br />

on<br />

page<br />

242<br />

v<br />

“Step<br />

8:<br />

Add<br />

service<br />

name<br />

and<br />

keytab<br />

file<br />

entries<br />

(UNIX<br />

only)”<br />

on<br />

page<br />

242<br />

v<br />

“Step<br />

9:<br />

Restart<br />

<strong>WebSEAL</strong>”<br />

on<br />

page<br />

243<br />

v<br />

“Step<br />

10:<br />

Configure<br />

the<br />

Internet<br />

Explorer<br />

client”<br />

on<br />

page<br />

243<br />

Troubleshooting<br />

in<strong>for</strong>mation:<br />

v<br />

“Troubleshooting<br />

tips”<br />

on<br />

page<br />

243<br />

Step<br />

1:<br />

Configure<br />

<strong>WebSEAL</strong><br />

server<br />

into<br />

Active<br />

Directory<br />

domain<br />

To<br />

participate<br />

in<br />

a<br />

Kerberos<br />

exchange<br />

with<br />

IE,<br />

a<br />

<strong>WebSEAL</strong><br />

server<br />

must<br />

have<br />

an<br />

identity<br />

in<br />

the<br />

Active<br />

Directory<br />

Kerberos<br />

domain.<br />

This<br />

requires<br />

that<br />

<strong>WebSEAL</strong><br />

be<br />

registered<br />

with<br />

the<br />

Active<br />

Directory<br />

domain<br />

controller.<br />

This<br />

enables<br />

the<br />

IE<br />

browser<br />

to<br />

obtain<br />

a<br />

Kerberos<br />

ticket<br />

from<br />

the<br />

Active<br />

Directory<br />

domain<br />

controller<br />

in<br />

order<br />

to<br />

access<br />

the<br />

<strong>WebSEAL</strong><br />

server.<br />

See<br />

the<br />

Microsoft<br />

documentation<br />

<strong>for</strong><br />

instructions<br />

on<br />

how<br />

to<br />

add<br />

an<br />

identity<br />

<strong>for</strong><br />

the<br />

<strong>WebSEAL</strong><br />

server<br />

host<br />

into<br />

an<br />

Active<br />

Directory<br />

domain.<br />

Notes:<br />

v<br />

On<br />

Windows,<br />

the<br />

default<br />

<strong>WebSEAL</strong><br />

server<br />

(first<br />

server<br />

instance)<br />

uses<br />

the<br />

Local<br />

Service<br />

Account<br />

identity<br />

when<br />

contacting<br />

the<br />

Active<br />

Directory<br />

domain<br />

controller.<br />

Additional<br />

<strong>WebSEAL</strong><br />

server<br />

instances<br />

must<br />

be<br />

configured<br />

to<br />

use<br />

a<br />

different<br />

user<br />

account.<br />

The<br />

user<br />

account<br />

must<br />

match<br />

a<br />

unique<br />

Active<br />

Directory<br />

user<br />

<strong>for</strong><br />

the<br />

<strong>WebSEAL</strong><br />

server<br />

identity.<br />

v<br />

On<br />

UNIX,<br />

ensure<br />

that<br />

the<br />

user<br />

name<br />

matches<br />

the<br />

host<br />

name<br />

of<br />

the<br />

<strong>WebSEAL</strong><br />

server<br />

host.<br />

Do<br />

not<br />

use<br />

the<br />

full<br />

domain<br />

name.<br />

For<br />

example,<br />

<strong>for</strong><br />

the<br />

system<br />

diamond.subnet2.ibm.com,<br />

create<br />

a<br />

user<br />

diamond.<br />

Do<br />

not<br />

require<br />

the<br />

user<br />

to<br />

change<br />

password<br />

at<br />

next<br />

log<br />

in.<br />

Do<br />

not<br />

set<br />

the<br />

password<br />

to<br />

expire.<br />

v<br />

Ensure<br />

that<br />

DNS<br />

is<br />

configured<br />

properly<br />

<strong>for</strong><br />

each<br />

of<br />

the<br />

participating<br />

machine.<br />

One<br />

way<br />

to<br />

confirm<br />

this<br />

is<br />

to<br />

run<br />

<strong>for</strong>ward<br />

and<br />

reverse<br />

nslookup<br />

on<br />

each<br />

machine.<br />

Multiple<br />

<strong>WebSEAL</strong><br />

instances<br />

Chapter<br />

9.<br />

Client<br />

single<br />

sign-on<br />

solutions<br />

237

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!