03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The attribute layer also provides the means for a client to assert identity<br />

attributes that differ from the client’s authentication identity (as established in the<br />

transport or SAS authentication layers). This identity assertion capability is the<br />

basis of a general-purpose impersonation mechanism that makes it possible for<br />

an intermediate to act on behalf of some identity other than itself. This can<br />

improve the performance of a system since the authentication of a client is<br />

relatively expensive. The server can validate the request by checking its trust<br />

rules.<br />

In order to invoke an EJB method that has been secured, a protocol is required<br />

to determine the level of security and type of authentication to be agreed upon by<br />

the client and server. During the method invocation, the protocol must coalesce<br />

the server’s authentication requirements, which is determined by the object’s<br />

IOR, with the client’s authentication requirements, which is determined by the<br />

client’s configuration and select the appropriate policy.<br />

The Application Server can be configured to support both CSIv2 and <strong>IBM</strong>’s<br />

Secure Association Service (SAS). In fact, both protocols can be supported<br />

simultaneously; that is to say the Application Server may receive a request using<br />

one protocol and then receive another request using the other protocol. <strong>IBM</strong>’s<br />

SAS is the protocol used in previous versions of the Application Server and<br />

although deprecated, is provided in version five for interoperability with older<br />

clients and servers. CSIv2, which is the focus of this chapter, allows vendors to<br />

securely interoperate and provides a greater number of features over SAS.<br />

CSIv2 and SAS are add-on IIOP services, where IIOP is the communications<br />

protocol used to send messages between two ORBs. In preparation for a request<br />

to flow from client to server, a connection between the two ORBs must be<br />

established over TCP/IP. The client ORB will invoke the authentication protocol’s<br />

client connection interceptor which is used to read the tagged components in the<br />

IOR of the server-based object being requested. This is how the authentication<br />

policy is established. Once the policy has been established, the ORB will make<br />

the connection, with the optional addition of the SSL cipher.<br />

The client ORB invokes the client request interceptor once the connection has<br />

been established and sends security information other than what was<br />

established by the transport. This may include a user ID and password token,<br />

which is authenticated by the server, an authentication mechanism-specific<br />

token, which is validated by the server or an identity assertion token, which<br />

allows an intermediate to act on behalf of some identity other than itself. This<br />

additional security information is sent with the message in a GIOP service<br />

context.<br />

Chapter 6. Securing Java clients 101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!