10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

You<br />

can<br />

configure<br />

the<br />

e-community<br />

authentication<br />

mechanism<br />

by<br />

specifying<br />

the<br />

sso-create<br />

and<br />

sso-consume<br />

parameters<br />

with<br />

the<br />

full<br />

path<br />

name<br />

of<br />

the<br />

appropriate<br />

plat<strong>for</strong>m-specific<br />

default<br />

library<br />

file<br />

in<br />

the<br />

[authentication-mechanism]<br />

stanza<br />

of<br />

the<br />

<strong>WebSEAL</strong><br />

configuration<br />

file.<br />

For<br />

example:<br />

Solaris:<br />

[authentication-mechanisms]<br />

sso-create<br />

=<br />

/opt/pdwebrte/lib/libssocreate.so<br />

sso-consume<br />

=<br />

/opt/pdwebrte/lib/libssoconsume.so<br />

Windows:<br />

[authentication-mechanisms]<br />

sso-create<br />

=<br />

C:\Program<br />

Files\<strong>Tivoli</strong>\PDWebRTE\bin\ssocreate.dll<br />

sso-consume<br />

=<br />

C:\Program<br />

Files\<strong>Tivoli</strong>\PDWebRTE\bin\ssoconsume.dll<br />

4.<br />

Encrypting<br />

the<br />

″vouch<br />

<strong>for</strong>″<br />

token<br />

<strong>WebSEAL</strong><br />

must<br />

encrypt<br />

the<br />

authentication<br />

data<br />

placed<br />

in<br />

the<br />

token<br />

using<br />

a<br />

key<br />

generated<br />

by<br />

the<br />

cdsso_key_gen<br />

utility.<br />

You<br />

must<br />

″synchronize″<br />

this<br />

key<br />

by<br />

sharing<br />

the<br />

key<br />

file<br />

with<br />

each<br />

<strong>WebSEAL</strong><br />

server<br />

in<br />

each<br />

participating<br />

domain.<br />

Each<br />

participating<br />

<strong>WebSEAL</strong><br />

server<br />

in<br />

each<br />

domain<br />

needs<br />

to<br />

use<br />

the<br />

same<br />

key.<br />

Note:<br />

The<br />

distribution<br />

of<br />

key<br />

files<br />

is<br />

not<br />

a<br />

part<br />

of<br />

the<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

e-community<br />

process.<br />

You<br />

must<br />

manually<br />

and<br />

securely<br />

copy<br />

keys<br />

to<br />

each<br />

participating<br />

server.<br />

The<br />

cdsso_key_gen<br />

utility<br />

requires<br />

that<br />

you<br />

specify<br />

the<br />

location<br />

(absolute<br />

pathname)<br />

of<br />

the<br />

key<br />

file<br />

when<br />

you<br />

run<br />

the<br />

utility.<br />

You<br />

must<br />

also<br />

use<br />

a<br />

full<br />

path<br />

name<br />

to<br />

run<br />

this<br />

utility:<br />

UNIX:<br />

#<br />

/opt/pdwebrte/bin/cdsso_key_gen<br />

<br />

Windows:<br />

MSDOS><br />

C:\Program<br />

Files\<strong>Tivoli</strong>\PDWebRTE\bin\cdsso_key_gen<br />

<br />

The<br />

location<br />

of<br />

the<br />

key<br />

files<br />

used<br />

to<br />

secure<br />

tokens<br />

sent<br />

between<br />

servers<br />

participating<br />

in<br />

the<br />

e-community<br />

is<br />

specified<br />

in<br />

the<br />

[e-community-domain-keys]<br />

stanza.<br />

[e-community-domain-keys]<br />

<br />

=<br />

<br />

<br />

=<br />

<br />

E-community<br />

Domain<br />

Keys<br />

The<br />

location<br />

of<br />

the<br />

key<br />

files<br />

required<br />

<strong>for</strong><br />

encrypting<br />

and<br />

decrypting<br />

the<br />

tokens<br />

exchanged<br />

among<br />

the<br />

servers<br />

participating<br />

in<br />

the<br />

e-community<br />

is<br />

specified<br />

in<br />

the<br />

[e-community-domain-keys]<br />

stanza.<br />

You<br />

must<br />

specify<br />

fully<br />

qualified<br />

domain<br />

names<br />

<strong>for</strong><br />

the<br />

servers<br />

and<br />

absolute<br />

path<br />

names<br />

<strong>for</strong><br />

the<br />

key<br />

file<br />

locations.<br />

The<br />

following<br />

example<br />

provides<br />

the<br />

MAS<br />

(domain<br />

A)<br />

with<br />

key<br />

files<br />

<strong>for</strong><br />

communicating<br />

with<br />

two<br />

remote<br />

domains(dB<br />

and<br />

dC)<br />

and<br />

a<br />

key<br />

<strong>for</strong><br />

communicating<br />

with<br />

other<br />

servers<br />

in<br />

domain<br />

A:<br />

Chapter<br />

9.<br />

Client<br />

single<br />

sign-on<br />

solutions<br />

267

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!