10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

To<br />

enable<br />

the<br />

server<br />

DN<br />

matching,<br />

specify<br />

the<br />

back-end<br />

server<br />

DN<br />

when<br />

you<br />

create<br />

the<br />

SSL<br />

junction<br />

using<br />

the<br />

–D<br />

″DN″<br />

option.<br />

To<br />

preserve<br />

any<br />

blank<br />

spaces<br />

in<br />

the<br />

string,<br />

surround<br />

the<br />

DN<br />

string<br />

with<br />

double<br />

quotation<br />

marks.<br />

For<br />

example:<br />

-D<br />

"/C=US/O=<strong>Tivoli</strong>/OU=SecureWay/CN=<strong>Access</strong><br />

<strong>Manager</strong>"<br />

The<br />

–D<br />

option<br />

is<br />

appropriate<br />

only<br />

when<br />

used<br />

with<br />

the<br />

–K<br />

or<br />

–B<br />

option.<br />

<strong>WebSEAL</strong><br />

authenticates<br />

with<br />

client<br />

certificate<br />

Use<br />

the<br />

–K<br />

option<br />

to<br />

enable<br />

<strong>WebSEAL</strong><br />

to<br />

authenticate<br />

to<br />

the<br />

junctioned<br />

back-end<br />

server<br />

using<br />

its<br />

client<br />

certificate.<br />

-K<br />

"key_label"<br />

The<br />

conditions<br />

<strong>for</strong><br />

this<br />

scenario<br />

include:<br />

v<br />

The<br />

back-end<br />

server<br />

is<br />

set<br />

up<br />

to<br />

require<br />

verification<br />

of<br />

<strong>WebSEAL</strong>’s<br />

identity<br />

with<br />

a<br />

client<br />

certificate.<br />

v<br />

Using<br />

the<br />

iKeyman<br />

utility<br />

to<br />

create,<br />

label,<br />

and<br />

store<br />

a<br />

special<br />

key<br />

that<br />

is<br />

used<br />

solely<br />

as<br />

<strong>WebSEAL</strong>’s<br />

client<br />

certificate<br />

when<br />

authenticating<br />

to<br />

a<br />

junctioned<br />

back-end<br />

server.<br />

v<br />

It<br />

is<br />

also<br />

highly<br />

recommended<br />

that<br />

you<br />

configure<br />

the<br />

junction<br />

<strong>for</strong><br />

DN<br />

matching<br />

(–D).<br />

The<br />

–K<br />

option<br />

uses<br />

an<br />

argument<br />

that<br />

specifies<br />

the<br />

key-label<br />

of<br />

the<br />

required<br />

certificate<br />

as<br />

stored<br />

in<br />

the<br />

GSKit<br />

key<br />

database.<br />

Use<br />

the<br />

iKeyman<br />

utility<br />

to<br />

add<br />

new<br />

certificates<br />

to<br />

the<br />

key<br />

database.<br />

You<br />

must<br />

surround<br />

the<br />

key-label<br />

argument<br />

with<br />

quotation<br />

marks.<br />

For<br />

example:<br />

-K<br />

"cert1_Tiv"<br />

If<br />

the<br />

key<br />

resides<br />

on<br />

cryptographic<br />

hardware,<br />

you<br />

must<br />

specify<br />

the<br />

<strong>WebSEAL</strong><br />

token<br />

device<br />

with<br />

the<br />

key<br />

label.<br />

-K<br />

"token_name:key-label"<br />

For<br />

example:<br />

-K<br />

"websealtoken:junctionkey"<br />

See<br />

“Cryptographic<br />

hardware<br />

<strong>for</strong><br />

encryption<br />

and<br />

key<br />

storage”<br />

on<br />

page<br />

32.<br />

See<br />

“Configuring<br />

<strong>WebSEAL</strong><br />

key<br />

database<br />

parameters”<br />

on<br />

page<br />

229.<br />

<strong>WebSEAL</strong><br />

authenticates<br />

with<br />

BA<br />

header<br />

Use<br />

the<br />

–B<br />

–U<br />

″username″<br />

–W<br />

″password″<br />

option<br />

to<br />

enable<br />

<strong>WebSEAL</strong><br />

authentication<br />

via<br />

Basic<br />

Authentication.<br />

-B<br />

-U<br />

"username"<br />

-W<br />

"password"<br />

The<br />

conditions<br />

<strong>for</strong><br />

this<br />

scenario<br />

include:<br />

v<br />

The<br />

back-end<br />

server<br />

is<br />

set<br />

up<br />

to<br />

require<br />

verification<br />

of<br />

<strong>WebSEAL</strong>’s<br />

identity<br />

with<br />

a<br />

BA<br />

header.<br />

v<br />

Do<br />

not<br />

configure<br />

the<br />

junction<br />

with<br />

any<br />

–b<br />

option.<br />

(Internally,<br />

however,<br />

the<br />

–B<br />

option<br />

uses<br />

–b<br />

filter.)<br />

v<br />

<strong>WebSEAL</strong><br />

is<br />

configured<br />

to<br />

pass<br />

its<br />

identity<br />

in<strong>for</strong>mation<br />

in<br />

a<br />

BA<br />

header<br />

to<br />

authenticate<br />

to<br />

the<br />

back-end<br />

server.<br />

Chapter<br />

10.<br />

<strong>WebSEAL</strong><br />

junctions<br />

283

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!