10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>WebSEAL</strong><br />

parses<br />

the<br />

HTML<br />

page<br />

to<br />

identify<br />

the<br />

request<br />

method,<br />

the<br />

action<br />

URI,<br />

and<br />

any<br />

other<br />

input<br />

fields<br />

in<br />

the<br />

<strong>for</strong>m,<br />

and<br />

saves<br />

them<br />

<strong>for</strong><br />

use<br />

in<br />

step<br />

8.<br />

8.<br />

<strong>WebSEAL</strong><br />

generates<br />

the<br />

authentication<br />

request<br />

(completes<br />

the<br />

login<br />

<strong>for</strong>m)<br />

and<br />

sends<br />

it<br />

to<br />

the<br />

back-end<br />

application.<br />

9.<br />

The<br />

application<br />

authenticates<br />

the<br />

user<br />

using<br />

the<br />

authentication<br />

data<br />

supplied<br />

by<br />

<strong>WebSEAL</strong><br />

in<br />

the<br />

<strong>for</strong>m.<br />

The<br />

application<br />

returns<br />

a<br />

redirect<br />

to<br />

content.html.<br />

10.<br />

<strong>WebSEAL</strong><br />

combines<br />

any<br />

cookies<br />

saved<br />

from<br />

the<br />

responses<br />

at<br />

step<br />

7<br />

and<br />

step<br />

9,<br />

and<br />

returns<br />

these<br />

cookies<br />

with<br />

the<br />

redirect<br />

to<br />

the<br />

browser.<br />

Note:<br />

This<br />

completes<br />

the<br />

<strong>for</strong>ms<br />

SSO-specific<br />

functionality.<br />

11.<br />

The<br />

browser<br />

follows<br />

the<br />

redirect<br />

and<br />

requests:<br />

https://webseal/<strong>for</strong>msso/content.html<br />

12.<br />

<strong>WebSEAL</strong><br />

passes<br />

the<br />

request<br />

to<br />

the<br />

back-end<br />

application<br />

across<br />

the<br />

junction.<br />

During<br />

this<br />

process,<br />

the<br />

browser<br />

makes<br />

three<br />

requests<br />

to<br />

<strong>WebSEAL</strong>.<br />

From<br />

the<br />

user’s<br />

perspective,<br />

only<br />

a<br />

single<br />

request<br />

<strong>for</strong><br />

https://webseal/<strong>for</strong>msso/content.html<br />

is<br />

made.<br />

The<br />

other<br />

requests<br />

occur<br />

automatically<br />

through<br />

HTTP<br />

redirects.<br />

Requirements<br />

<strong>for</strong><br />

application<br />

support<br />

Single<br />

sign-on<br />

<strong>for</strong><br />

<strong>for</strong>ms<br />

authentication<br />

is<br />

supported<br />

on<br />

applications<br />

that<br />

meet<br />

the<br />

following<br />

requirements:<br />

v<br />

The<br />

login<br />

page<br />

or<br />

pages<br />

<strong>for</strong><br />

the<br />

application<br />

must<br />

be<br />

uniquely<br />

identifiable<br />

via<br />

a<br />

single<br />

regular<br />

expression<br />

or<br />

several<br />

regular<br />

expressions.<br />

v<br />

The<br />

login<br />

page<br />

can<br />

include<br />

more<br />

than<br />

one<br />

HTML<br />

<strong>for</strong>m.<br />

However,<br />

the<br />

login<br />

<strong>for</strong>m<br />

must<br />

be<br />

identified<br />

by<br />

applying<br />

a<br />

regular<br />

expression<br />

to<br />

the<br />

action<br />

URIs<br />

of<br />

each<br />

of<br />

the<br />

login<br />

<strong>for</strong>ms,<br />

or<br />

the<br />

login<br />

<strong>for</strong>m<br />

must<br />

be<br />

the<br />

first<br />

<strong>for</strong>m<br />

in<br />

the<br />

login<br />

page.<br />

Note<br />

that<br />

when<br />

using<br />

the<br />

″action″<br />

attribute<br />

to<br />

identify<br />

the<br />

login<br />

<strong>for</strong>m,<br />

the<br />

″action″<br />

attribute<br />

has<br />

not<br />

passed<br />

through<br />

<strong>WebSEAL</strong>’s<br />

HTML<br />

filtering.<br />

The<br />

regular<br />

expression<br />

should<br />

match<br />

the<br />

action<br />

URI<br />

prior<br />

to<br />

being<br />

filtered.<br />

v<br />

Client-side<br />

scripting<br />

may<br />

be<br />

used<br />

to<br />

validate<br />

input<br />

data,<br />

but<br />

it<br />

must<br />

not<br />

modify<br />

the<br />

input<br />

data<br />

(such<br />

as<br />

using<br />

Javascript<br />

to<br />

set<br />

cookies<br />

in<br />

the<br />

user’s<br />

browser).<br />

v<br />

Login<br />

data<br />

is<br />

submitted<br />

at<br />

only<br />

one<br />

point<br />

in<br />

the<br />

authentication<br />

process.<br />

v<br />

The<br />

junction<br />

where<br />

the<br />

authentication<br />

request<br />

is<br />

directed<br />

must<br />

be<br />

the<br />

same<br />

junction<br />

where<br />

the<br />

login<br />

page<br />

is<br />

returned.<br />

Creating<br />

the<br />

configuration<br />

file<br />

<strong>for</strong><br />

<strong>for</strong>ms<br />

single<br />

sign-on<br />

The<br />

<strong>for</strong>ms<br />

single<br />

sign-on<br />

configuration<br />

file<br />

is<br />

custom-created<br />

by<br />

the<br />

administrator<br />

and<br />

saved<br />

in<br />

any<br />

location.<br />

The<br />

–S<br />

option<br />

on<br />

the<br />

junction<br />

enables<br />

the<br />

<strong>for</strong>ms<br />

single<br />

sign-on<br />

functionality<br />

and<br />

specifies<br />

the<br />

location<br />

of<br />

the<br />

configuration<br />

file.<br />

See<br />

“Enabling<br />

<strong>for</strong>ms<br />

single<br />

sign-on”<br />

on<br />

page<br />

332.<br />

A<br />

sample<br />

configuration<br />

file<br />

(containing<br />

commented<br />

instructions)<br />

is<br />

provided<br />

with<br />

the<br />

<strong>WebSEAL</strong><br />

installation<br />

and<br />

is<br />

located<br />

in<br />

the<br />

following<br />

directory:<br />

UNIX:<br />

/opt/pdweb/etc/fsso.conf.template<br />

Windows:<br />

C:\Program<br />

Files\<strong>Tivoli</strong>\PDWeb\etc\fsso.conf.template<br />

The<br />

configuration<br />

file<br />

must<br />

begin<br />

with<br />

the<br />

[<strong>for</strong>ms-sso-login-pages]<br />

stanza<br />

and<br />

has<br />

the<br />

following<br />

<strong>for</strong>mat<br />

328<br />

<strong>IBM</strong><br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

<strong>for</strong><br />

e-<strong>business</strong>:<br />

<strong>WebSEAL</strong><br />

<strong>Administration</strong><br />

Guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!