10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A<br />

generic<br />

password<br />

eliminates<br />

password<br />

administration<br />

and<br />

supports<br />

the<br />

application<br />

on<br />

a<br />

per-user<br />

basis.<br />

The<br />

″dummy″<br />

password<br />

is<br />

set<br />

in<br />

basicauth-dummy-passwd<br />

parameter<br />

of<br />

the<br />

<strong>WebSEAL</strong><br />

configuration<br />

file:<br />

[junction]<br />

basicauth-dummy-passwd<br />

=<br />

password<br />

This<br />

scenario<br />

assumes<br />

the<br />

back-end<br />

server<br />

requires<br />

authentication<br />

from<br />

a<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

identity.<br />

By<br />

mapping<br />

a<br />

client<br />

user<br />

to<br />

a<br />

known<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

user,<br />

<strong>WebSEAL</strong><br />

manages<br />

authentication<br />

<strong>for</strong><br />

the<br />

back-end<br />

server<br />

and<br />

provides<br />

a<br />

simple<br />

domain-wide<br />

single<br />

sign-on<br />

solution.<br />

The<br />

following<br />

conditions<br />

exist<br />

<strong>for</strong><br />

this<br />

solution:<br />

v<br />

<strong>WebSEAL</strong><br />

is<br />

configured<br />

to<br />

supply<br />

the<br />

back-end<br />

server<br />

with<br />

the<br />

user<br />

name<br />

contained<br />

in<br />

the<br />

original<br />

client<br />

request<br />

plus<br />

a<br />

generic<br />

(″dummy″)<br />

password.<br />

v<br />

The<br />

″dummy″<br />

password<br />

is<br />

configured<br />

in<br />

the<br />

<strong>WebSEAL</strong><br />

configuration<br />

file.<br />

v<br />

The<br />

back-end<br />

server<br />

registry<br />

must<br />

recognize<br />

the<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

identity<br />

supplied<br />

in<br />

the<br />

HTTP<br />

BA<br />

header.<br />

v<br />

Because<br />

sensitive<br />

authentication<br />

in<strong>for</strong>mation<br />

(user<br />

name<br />

and<br />

password)<br />

is<br />

passed<br />

across<br />

the<br />

junction,<br />

the<br />

security<br />

of<br />

the<br />

junction<br />

is<br />

important.<br />

An<br />

SSL<br />

junction<br />

is<br />

highly<br />

recommended.<br />

Limitations<br />

The<br />

same<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

″dummy″<br />

password<br />

is<br />

used<br />

<strong>for</strong><br />

all<br />

requests;<br />

all<br />

users<br />

have<br />

the<br />

same<br />

password<br />

in<br />

the<br />

back-end<br />

server<br />

registry.<br />

The<br />

use<br />

of<br />

the<br />

common<br />

″dummy″<br />

password<br />

offers<br />

no<br />

basis<br />

<strong>for</strong><br />

the<br />

application<br />

server<br />

to<br />

prove<br />

the<br />

legitimacy<br />

of<br />

the<br />

client<br />

logging<br />

in<br />

with<br />

that<br />

user<br />

name.<br />

If<br />

clients<br />

always<br />

go<br />

through<br />

<strong>WebSEAL</strong><br />

to<br />

access<br />

the<br />

back-end<br />

server,<br />

this<br />

solution<br />

does<br />

not<br />

present<br />

any<br />

security<br />

problems.<br />

However,<br />

it<br />

is<br />

important<br />

to<br />

physically<br />

secure<br />

the<br />

back-end<br />

server<br />

from<br />

other<br />

possible<br />

means<br />

of<br />

access.<br />

Because<br />

this<br />

scenario<br />

has<br />

no<br />

password-level<br />

security,<br />

the<br />

back-end<br />

server<br />

must<br />

implicitly<br />

trust<br />

<strong>WebSEAL</strong><br />

to<br />

verify<br />

the<br />

legitimacy<br />

of<br />

the<br />

client.<br />

The<br />

back-end<br />

server<br />

registry<br />

must<br />

also<br />

recognize<br />

the<br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

identity<br />

in<br />

order<br />

to<br />

accept<br />

it.<br />

Client <strong>WebSEAL</strong><br />

SSL junction Web<br />

Application<br />

Server<br />

<strong>WebSEAL</strong> supplies Policy<br />

Director identity and "dummy"<br />

password<br />

any<br />

authentication<br />

mechanism<br />

Registry Registry<br />

Figure<br />

18.<br />

BA<br />

Header<br />

contains<br />

identity<br />

and<br />

″dummy″<br />

password<br />

Chapter<br />

11.<br />

Single<br />

sign-on<br />

solutions<br />

across<br />

junctions<br />

317

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!