10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring CDSSO authentication<br />

CDSSO<br />

v<br />

v<br />

v<br />

conditions<br />

and<br />

requirements<br />

All <strong>WebSEAL</strong> servers participating in CDSSO must have machine times<br />

synchronized. Authentication between servers can fail when machine time<br />

differences are too great.<br />

For CDSSO to function successfully, each participating <strong>WebSEAL</strong> server must<br />

reveal its fully qualified host name to the other participating servers in the<br />

cross-domain environment. If any host name does not include a domain, CDSSO<br />

cannot be enabled and an error message is logged in msg_webseald.log. When<br />

setting up a CDSSO environment, ensure that the machine-specific networking<br />

setup <strong>for</strong> each participating server is configured to identify the server with a<br />

fully qualified host name.<br />

Because some <strong>WebSEAL</strong> configuration requires machine host names to be<br />

described as fully qualified host names, you must ensure that your system and<br />

network can resolve machine names into fully qualified host names. For<br />

example, using fully qualified host names allows <strong>for</strong> many host names (IP<br />

addresses) per machine, as in the case of multiple <strong>WebSEAL</strong> instances.<br />

Resolving machine names<br />

CDSSO can be disabled upon <strong>WebSEAL</strong> startup because the machine itself is not<br />

adequately configured to resolve machine names. The machine on which <strong>WebSEAL</strong><br />

resides needs to be able to fully resolve an IP address. Because this functionality is<br />

very operating system-specific, it is not the role of this document to provide<br />

instructions. Always consult your system administrator if you are not sure your<br />

system has the proper capabilities.<br />

The following general Solaris-specific in<strong>for</strong>mation is provided only as an example:<br />

Goal: Configure the machine to first look to DNS be<strong>for</strong>e checking the local<br />

/etc/hosts file <strong>for</strong> DNS in<strong>for</strong>mation.<br />

1.<br />

/<br />

Client<br />

CDMF<br />

Shared<br />

Library<br />

Domain B<br />

single sign-on<br />

<strong>WebSEAL</strong><br />

B<br />

CDSSO<br />

Library<br />

SSL<br />

Domain A<br />

<strong>WebSEAL</strong><br />

A<br />

Make sure that /etc/resolv.conf has valid DNS server entries.<br />

/<br />

CDMF<br />

Shared<br />

Library<br />

/pkmscdsso<br />

� Client clicks on link to Domain B.<br />

� <strong>WebSEAL</strong> A CDSSO uses CDMF library to get<br />

additional user in<strong>for</strong>mation. Then builds and<br />

sends encrypted ID token with request.<br />

� <strong>WebSEAL</strong> B decrypts and validates token<br />

� <strong>WebSEAL</strong> B CDSSO calls CDMF shared<br />

library to map the user identity.<br />

� Credential is built and client participates in<br />

Domain B<br />

Figure 8. Cross-domain single sign-on process with CDMF<br />

Chapter 9. Client single sign-on solutions<br />

247

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!