10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The<br />

link<br />

contains<br />

a<br />

special<br />

CDSSO<br />

management<br />

page<br />

expression:<br />

/pkmscdsso?<br />

For<br />

example:<br />

http://websealA/pkmscdsso?https://websealB/resource.html<br />

3.<br />

The<br />

request<br />

is<br />

first<br />

processed<br />

by<br />

the<br />

<strong>WebSEAL</strong><br />

server<br />

in<br />

domain<br />

A.<br />

The<br />

websealA<br />

server<br />

builds<br />

an<br />

authentication<br />

token<br />

that<br />

contains<br />

the<br />

user’s<br />

credentials,<br />

including<br />

the<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

identity<br />

(short<br />

name),<br />

the<br />

current<br />

domain<br />

(″A″),<br />

additional<br />

user<br />

in<strong>for</strong>mation,<br />

and<br />

a<br />

time<br />

stamp.<br />

This<br />

process<br />

is<br />

per<strong>for</strong>med<br />

by<br />

the<br />

″token<br />

create″<br />

function<br />

of<br />

the<br />

built-in<br />

single<br />

sign-on<br />

authentication<br />

mechanism<br />

(library).<br />

The<br />

additional<br />

user<br />

in<strong>for</strong>mation<br />

(extended<br />

attributes)<br />

can<br />

be<br />

obtained<br />

by<br />

a<br />

call<br />

out<br />

to<br />

the<br />

customized<br />

CDMF<br />

shared<br />

library<br />

(cdmf_get_usr_attributes).<br />

This<br />

library<br />

has<br />

the<br />

ability<br />

to<br />

supply<br />

user<br />

attributes<br />

that<br />

can<br />

be<br />

used<br />

by<br />

domain<br />

B<br />

during<br />

the<br />

user<br />

mapping<br />

process.<br />

<strong>WebSEAL</strong><br />

triple-DES<br />

encrypts<br />

this<br />

token<br />

data<br />

with<br />

the<br />

symmetric<br />

key<br />

generated<br />

by<br />

the<br />

cdsso_key_gen<br />

utility.<br />

This<br />

key<br />

file<br />

is<br />

shared<br />

and<br />

specified<br />

in<br />

the<br />

[cdsso-peers]<br />

stanza<br />

of<br />

the<br />

<strong>WebSEAL</strong><br />

configuration<br />

file<br />

on<br />

both<br />

domain<br />

A<br />

and<br />

domain<br />

B<br />

<strong>WebSEAL</strong><br />

servers.<br />

The<br />

token<br />

contains<br />

a<br />

configurable<br />

time<br />

stamp<br />

(authtoken-lifetime)<br />

that<br />

defines<br />

the<br />

lifetime<br />

of<br />

the<br />

token.<br />

The<br />

time<br />

stamp,<br />

when<br />

properly<br />

configured,<br />

can<br />

prevent<br />

replay<br />

attacks.<br />

The<br />

token<br />

is<br />

contained<br />

in<br />

a<br />

redirected<br />

request<br />

to<br />

the<br />

destination<br />

server,<br />

using<br />

the<br />

URL<br />

contained<br />

in<br />

the<br />

pkmscdsso<br />

link.<br />

For<br />

example:<br />

http://websealB/resource.html?PD-ID=<br />

4.<br />

The<br />

websealA<br />

server<br />

redirects<br />

the<br />

request<br />

containing<br />

the<br />

encrypted<br />

token<br />

back<br />

to<br />

the<br />

browser<br />

and<br />

then<br />

to<br />

the<br />

websealB<br />

server<br />

(HTTP<br />

redirection).<br />

5.<br />

The<br />

websealB<br />

server<br />

decodes<br />

and<br />

validates<br />

the<br />

token<br />

as<br />

coming<br />

from<br />

the<br />

referring<br />

domain.<br />

This<br />

process<br />

is<br />

per<strong>for</strong>med<br />

by<br />

the<br />

″token<br />

consume″<br />

function<br />

of<br />

the<br />

built-in<br />

single<br />

sign-on<br />

authentication<br />

mechanism<br />

(library).<br />

6.<br />

The<br />

token<br />

consume<br />

functionality<br />

can<br />

further<br />

call<br />

out<br />

to<br />

a<br />

customized<br />

CDMF<br />

library<br />

which<br />

per<strong>for</strong>ms<br />

the<br />

actual<br />

user<br />

mapping<br />

(cdmf_map_usr).<br />

The<br />

CDMF<br />

library<br />

passes<br />

the<br />

user’s<br />

identity,<br />

and<br />

any<br />

extended<br />

attribute<br />

in<strong>for</strong>mation,<br />

back<br />

to<br />

the<br />

token<br />

consume<br />

library.<br />

The<br />

token<br />

consume<br />

library<br />

uses<br />

this<br />

in<strong>for</strong>mation<br />

to<br />

build<br />

a<br />

credential.<br />

7.<br />

The<br />

websealB<br />

authorization<br />

service<br />

permits<br />

or<br />

denies<br />

access<br />

to<br />

protected<br />

objects<br />

based<br />

on<br />

the<br />

user’s<br />

credential<br />

and<br />

the<br />

specific<br />

ACL<br />

permissions<br />

associated<br />

with<br />

the<br />

requested<br />

objects.<br />

246<br />

<strong>IBM</strong><br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

<strong>for</strong><br />

e-<strong>business</strong>:<br />

<strong>WebSEAL</strong><br />

<strong>Administration</strong><br />

Guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!