10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

For<br />

example:<br />

[e-community-sso]<br />

vf-url<br />

=<br />

/pkmsvouch<strong>for</strong><br />

You<br />

can<br />

also<br />

express<br />

an<br />

extended<br />

URL:<br />

vf-url<br />

=<br />

/ecommA/pkmsvouch<strong>for</strong><br />

The<br />

extended<br />

URL<br />

is<br />

used<br />

when<br />

the<br />

client<br />

is<br />

communicating<br />

with<br />

a<br />

MAS<br />

that<br />

is<br />

not<br />

a<br />

<strong>WebSEAL</strong><br />

server.<br />

This<br />

use<br />

of<br />

vf-url<br />

enables<br />

the<br />

client<br />

to<br />

specify<br />

access<br />

to<br />

a<br />

MAS<br />

with<br />

specialized<br />

authentication<br />

library,<br />

such<br />

as<br />

a<br />

customized<br />

token<br />

consumption<br />

library.<br />

8.<br />

Configure<br />

token<br />

and<br />

ec-cookie<br />

lifetime<br />

values<br />

vf-token-lifetime<br />

The<br />

vf-token-lifetime<br />

parameter<br />

sets<br />

the<br />

lifetime<br />

timeout<br />

value<br />

(in<br />

seconds)<br />

of<br />

the<br />

″vouch<br />

<strong>for</strong>″<br />

token.<br />

This<br />

value<br />

is<br />

checked<br />

against<br />

the<br />

creation<br />

time<br />

stamped<br />

on<br />

the<br />

cookie.<br />

The<br />

default<br />

value<br />

is<br />

180<br />

seconds.<br />

You<br />

must<br />

take<br />

into<br />

account<br />

clock<br />

skew<br />

among<br />

participating<br />

servers.<br />

For<br />

example:<br />

[e-community-sso]<br />

vf-token-lifetime<br />

=<br />

180<br />

ec-cookie-lifetime<br />

The<br />

ec-cookie-lifetime<br />

parameter<br />

specifies<br />

the<br />

maximum<br />

lifetime<br />

(in<br />

minutes)<br />

of<br />

the<br />

e-community<br />

domain<br />

cookie.<br />

The<br />

default<br />

value<br />

is<br />

300<br />

minutes.<br />

For<br />

example:<br />

[e-community-sso]<br />

ec-cookie-lifetime<br />

=<br />

300<br />

You<br />

must<br />

take<br />

into<br />

account<br />

any<br />

clock<br />

skew<br />

among<br />

the<br />

participating<br />

domains.<br />

Clock<br />

skew<br />

means<br />

that<br />

the<br />

system<br />

times<br />

differ<br />

on<br />

the<br />

relevant<br />

servers<br />

in<br />

each<br />

domain.<br />

When<br />

this<br />

difference<br />

approaches<br />

the<br />

value<br />

of<br />

vf-token-lifetime,<br />

the<br />

effective<br />

lifetime<br />

of<br />

the<br />

token<br />

is<br />

greatly<br />

reduced.<br />

When<br />

this<br />

difference<br />

exceeds<br />

the<br />

value<br />

of<br />

vf-htoken-lifetime,<br />

tokens<br />

from<br />

one<br />

domain<br />

cannot<br />

be<br />

valid<br />

<strong>for</strong><br />

the<br />

other<br />

domain.<br />

Administrators<br />

should<br />

adjust<br />

vf-token-lifetime<br />

accordingly.<br />

However,<br />

when<br />

clock<br />

skew<br />

requires<br />

that<br />

vf-token-lifetime<br />

be<br />

set<br />

to<br />

a<br />

large<br />

value,<br />

the<br />

risk<br />

of<br />

replay<br />

attacks<br />

increases.<br />

In<br />

this<br />

case,<br />

administrators<br />

should<br />

consider<br />

synchronizing<br />

the<br />

system<br />

time<br />

on<br />

the<br />

relevant<br />

servers<br />

in<br />

each<br />

domain.<br />

See<br />

“e-community<br />

single<br />

sign-on”<br />

on<br />

page<br />

431.<br />

Enabling<br />

unauthenticated<br />

access<br />

You<br />

can<br />

control<br />

whether<br />

unauthenticated<br />

users<br />

are<br />

allowed<br />

access<br />

to<br />

unprotected<br />

resources<br />

on<br />

e-community<br />

SSO<br />

slave<br />

servers.<br />

When<br />

authenticated<br />

users<br />

are<br />

allowed<br />

this<br />

access,<br />

the<br />

slave<br />

server<br />

can<br />

serve<br />

the<br />

resource<br />

without<br />

requiring<br />

that<br />

the<br />

user<br />

authenticate<br />

through<br />

the<br />

master<br />

authentication<br />

server.<br />

When<br />

this<br />

policy<br />

is<br />

configured,<br />

the<br />

slave<br />

server<br />

will<br />

redirect<br />

to<br />

the<br />

master<br />

authentication<br />

server<br />

only<br />

when<br />

the<br />

client<br />

requests<br />

access<br />

to<br />

a<br />

protected<br />

resource.<br />

This<br />

policy<br />

is<br />

set<br />

through<br />

a<br />

setting<br />

in<br />

the<br />

<strong>WebSEAL</strong><br />

configuration<br />

file:<br />

270<br />

<strong>IBM</strong><br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

<strong>for</strong><br />

e-<strong>business</strong>:<br />

<strong>WebSEAL</strong><br />

<strong>Administration</strong><br />

Guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!