10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Rainbow<br />

CryptoSwift<br />

and<br />

nCipher<br />

nForce<br />

accelerators<br />

incorporate<br />

faster<br />

per<strong>for</strong>mance<br />

by<br />

providing<br />

more<br />

concurrent<br />

secure<br />

transactions.<br />

With<br />

the<br />

PKCS#11<br />

interface,<br />

RSA<br />

keys<br />

are<br />

stored<br />

on<br />

a<br />

cryptocard<br />

to<br />

ensure<br />

authentication.<br />

The<br />

<strong>IBM</strong><br />

4758<br />

and<br />

Eracom<br />

Orange<br />

per<strong>for</strong>m<br />

only<br />

as<br />

key<br />

storage<br />

devices.<br />

The<br />

nCipher<br />

nForce<br />

device<br />

can<br />

either<br />

per<strong>for</strong>m<br />

just<br />

acceleration<br />

or<br />

it<br />

can<br />

per<strong>for</strong>m<br />

both<br />

acceleration<br />

and<br />

key<br />

storage<br />

with<br />

PKCS#11<br />

support.<br />

The<br />

<strong>IBM</strong><br />

4758,<br />

Eracom<br />

Orange,<br />

and<br />

nCipher<br />

nForce<br />

devices<br />

(with<br />

PKCS#11<br />

support)<br />

ensure<br />

that<br />

keys<br />

are<br />

completely<br />

inaccessible<br />

to<br />

the<br />

outside<br />

world.<br />

Keys<br />

are<br />

never<br />

revealed<br />

in<br />

an<br />

unencrypted<br />

<strong>for</strong>m<br />

because<br />

they<br />

are<br />

stored<br />

on<br />

the<br />

hardware,<br />

providing<br />

enhanced<br />

key<br />

protection<br />

and<br />

authentication.<br />

Hardware<br />

cryptographic<br />

acceleration<br />

and<br />

key<br />

storage<br />

apply<br />

to<br />

the<br />

following<br />

<strong>WebSEAL</strong><br />

connections:<br />

v<br />

Browser<br />

to<br />

<strong>WebSEAL</strong><br />

v<br />

<strong>WebSEAL</strong><br />

to<br />

back-end<br />

junctioned<br />

server<br />

Conditions<br />

and<br />

prerequisites<br />

<strong>IBM</strong><br />

4758–023<br />

On<br />

Windows<br />

2000,<br />

the<br />

<strong>IBM</strong><br />

4758–023<br />

cryptographic<br />

card<br />

has<br />

an<br />

access<br />

limitation<br />

of<br />

32<br />

worker<br />

threads.<br />

There<strong>for</strong>e,<br />

<strong>WebSEAL</strong><br />

must<br />

be<br />

configured<br />

to<br />

use<br />

no<br />

more<br />

than<br />

32<br />

worker<br />

threads.<br />

The<br />

recommendation<br />

is<br />

30<br />

worker<br />

threads.<br />

The<br />

default<br />

setting<br />

<strong>for</strong><br />

worker<br />

threads<br />

at<br />

<strong>WebSEAL</strong><br />

installation<br />

time<br />

is<br />

50<br />

worker<br />

threads.<br />

Refer<br />

to<br />

“Managing<br />

worker<br />

thread<br />

allocation”<br />

on<br />

page<br />

41<br />

<strong>for</strong><br />

in<strong>for</strong>mation<br />

about<br />

worker<br />

thread<br />

configuration.<br />

Additional<br />

monitoring<br />

threads<br />

are<br />

used<br />

<strong>for</strong><br />

any<br />

junctions<br />

configured<br />

with<br />

the<br />

–K<br />

option<br />

(<strong>WebSEAL</strong><br />

authenticates<br />

with<br />

a<br />

client-side<br />

certificate)<br />

where<br />

the<br />

key<br />

(certificate)<br />

is<br />

stored<br />

on<br />

the<br />

<strong>IBM</strong><br />

4758<br />

hardware.<br />

In<br />

this<br />

situation,<br />

further<br />

reduce<br />

the<br />

number<br />

of<br />

worker<br />

threads<br />

by<br />

one<br />

<strong>for</strong><br />

each<br />

SSL<br />

–K<br />

junction<br />

using<br />

keys<br />

stored<br />

on<br />

the<br />

<strong>IBM</strong><br />

4758<br />

card.<br />

Configuring<br />

Cipher<br />

engine<br />

and<br />

FIPS<br />

mode<br />

processing<br />

You<br />

can<br />

use<br />

the<br />

<strong>WebSEAL</strong><br />

configuration<br />

file<br />

to<br />

specify<br />

the<br />

Cipher<br />

engine<br />

used<br />

by<br />

GSKit.<br />

[ssl]<br />

base-crypto-library<br />

=<br />

Default<br />

Valid<br />

values<br />

<strong>for</strong><br />

this<br />

entry<br />

are:<br />

v<br />

Default<br />

This<br />

value<br />

tells<br />

GSKit<br />

to<br />

select<br />

the<br />

optimal<br />

cryptographic<br />

base<br />

to<br />

use.<br />

For<br />

<strong>WebSEAL</strong><br />

Version<br />

5.1,<br />

this<br />

is<br />

ICC<br />

v<br />

ICC<br />

v<br />

RSA<br />

Specify<br />

RSA<br />

when<br />

using<br />

a<br />

BHAPI<br />

(Bsafe<br />

Hardware<br />

API)<br />

CryptoCard<br />

such<br />

as<br />

Rainbow<br />

CryptoSwift.<br />

The<br />

BHAPI<br />

interface<br />

is<br />

not<br />

supported<br />

by<br />

ICC.<br />

When<br />

the<br />

<strong>WebSEAL</strong><br />

deployment<br />

environment<br />

includes<br />

previous<br />

version<br />

(be<strong>for</strong>e<br />

Version<br />

5.1)<br />

<strong>WebSEAL</strong><br />

servers,<br />

consider<br />

using<br />

this<br />

setting<br />

because<br />

RSA<br />

was<br />

used<br />

by<br />

previous<br />

versions<br />

of<br />

GSKit<br />

<strong>for</strong><br />

cryptographic<br />

operations.<br />

Note:<br />

PKCS#11<br />

is<br />

available<br />

in<br />

all<br />

modes,<br />

except<br />

when<br />

FIPS<br />

is<br />

enabled.<br />

Chapter<br />

2.<br />

<strong>WebSEAL</strong><br />

server<br />

configuration<br />

33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!