10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Note:<br />

Traditional<br />

applications<br />

bundle<br />

the<br />

policy<br />

en<strong>for</strong>cer<br />

and<br />

resource<br />

manager<br />

into<br />

one<br />

process.<br />

Examples<br />

of<br />

this<br />

structure<br />

include<br />

<strong>WebSEAL</strong><br />

and<br />

third-party<br />

applications.<br />

v<br />

An<br />

authorization<br />

service<br />

per<strong>for</strong>ms<br />

the<br />

decision-making<br />

action<br />

on<br />

the<br />

request.<br />

The<br />

following<br />

diagram<br />

illustrates<br />

the<br />

complete<br />

authorization<br />

process:<br />

1.<br />

An<br />

authenticated<br />

client<br />

request<br />

<strong>for</strong><br />

a<br />

resource<br />

is<br />

directed<br />

to<br />

the<br />

resource<br />

manager<br />

and<br />

intercepted<br />

by<br />

the<br />

policy<br />

en<strong>for</strong>cer<br />

process.<br />

The<br />

resource<br />

manager<br />

can<br />

be<br />

<strong>WebSEAL</strong><br />

(<strong>for</strong><br />

HTTP,<br />

HTTPS<br />

access)<br />

or<br />

a<br />

third-party<br />

application.<br />

2.<br />

The<br />

policy<br />

en<strong>for</strong>cer<br />

process<br />

uses<br />

the<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

authorization<br />

API<br />

to<br />

call<br />

the<br />

authorization<br />

service<br />

<strong>for</strong><br />

an<br />

authorization<br />

decision.<br />

3.<br />

The<br />

authorization<br />

service<br />

per<strong>for</strong>ms<br />

an<br />

authorization<br />

check<br />

on<br />

the<br />

resource,<br />

represented<br />

as<br />

an<br />

object<br />

in<br />

the<br />

protected<br />

object<br />

space.<br />

Base<br />

POP<br />

policies<br />

are<br />

checked<br />

first.<br />

Next<br />

the<br />

ACL<br />

policy<br />

attached<br />

to<br />

the<br />

object<br />

is<br />

checked<br />

against<br />

the<br />

client’s<br />

credentials.<br />

Then,<br />

POP<br />

policies<br />

en<strong>for</strong>ced<br />

by<br />

the<br />

resource<br />

manager<br />

are<br />

checked.<br />

4.<br />

The<br />

decision<br />

to<br />

accept<br />

or<br />

deny<br />

the<br />

request<br />

is<br />

returned<br />

as<br />

a<br />

recommendation<br />

to<br />

the<br />

resource<br />

manager<br />

(through<br />

the<br />

policy<br />

en<strong>for</strong>cer).<br />

5.<br />

If<br />

the<br />

request<br />

is<br />

finally<br />

approved,<br />

the<br />

resource<br />

manager<br />

passes<br />

the<br />

request<br />

on<br />

to<br />

the<br />

application<br />

responsible<br />

<strong>for</strong><br />

the<br />

resource.<br />

6.<br />

The<br />

client<br />

receives<br />

the<br />

results<br />

of<br />

the<br />

requested<br />

operation.<br />

Planning<br />

and<br />

implementing<br />

the<br />

security<br />

policy<br />

A<br />

corporate<br />

security<br />

policy<br />

identifies:<br />

v<br />

The<br />

Web<br />

resources<br />

requiring<br />

protection<br />

v<br />

The<br />

level<br />

of<br />

protection<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

uses<br />

a<br />

virtual<br />

representation<br />

of<br />

these<br />

Web<br />

resources,<br />

called<br />

the<br />

protected<br />

object<br />

space.<br />

The<br />

protected<br />

object<br />

space<br />

contains<br />

objects<br />

that<br />

represent<br />

actual<br />

physical<br />

resources<br />

in<br />

your<br />

network.<br />

client<br />

authorization<br />

service<br />

Secure Domain<br />

authorization<br />

policy<br />

protected object<br />

space<br />

2. Request <strong>for</strong><br />

authorization<br />

(authAPI)<br />

5. Authorized<br />

operation<br />

1. Request<br />

6. Response<br />

3. Authorization<br />

check<br />

4. Authorization<br />

decision<br />

(authAPI)<br />

resources<br />

/<br />

resource<br />

manager<br />

policy<br />

en<strong>for</strong>cer<br />

Figure<br />

1.<br />

The<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

authorization<br />

process<br />

6<br />

<strong>IBM</strong><br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

<strong>for</strong><br />

e-<strong>business</strong>:<br />

<strong>WebSEAL</strong><br />

<strong>Administration</strong><br />

Guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!