03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

server. For example, if the client uses SSL client authentication to<br />

authenticate to the sending server, then the identity token to the downstream<br />

server will contain the certificate chain. This is important because it allows the<br />

receiving server to perform it's own mapping of the certificate chain. It<br />

enables more interoperability with other vendors and platforms.<br />

4. Once the identity format is understood and parsed, the identity is simply<br />

mapped to a credential. All identity token types map to the user ID field of the<br />

active user registry. This is done by mapping Distinguished Name to<br />

Distinguished Name and using filters to allow administrators to control the<br />

mapping.<br />

5. Some user registry methods are called to gather additional credential<br />

information used by authorization. In a stateful server, this is done one time<br />

for the sending server/receiving server pair where the identity tokens are the<br />

same. Subsequent requests will be made via a session ID.<br />

Note: Identity Assertion is only available using the CSIv2 protocol.<br />

6.4.1 Scenarios<br />

The following sections will describe five different cases where identity assertion<br />

is utilized to propagate credentials to downstream servers.<br />

The servers are running individual <strong>WebSphere</strong> Application Servers; they are not<br />

organized in a cell. For more information on cell configuration and Network<br />

Deployment, refer to 10.15, “Cell <strong>Security</strong>” on page 337.<br />

Sample application for the scenarios<br />

A testing application is also distributed with this book, besides the ITSOBank<br />

sample application. It is the Identity Assertion sample application made for<br />

testing purposes for the following scenarios (Scenario 1, 2, 3 and 4).<br />

The application is very simple, it consists three modules:<br />

► A J2EE client<br />

► An EJB module for the front-end server<br />

► An EJB module for the back-end server<br />

The application does the following:<br />

1. The client sends a message to the front-end server.<br />

2. On the front-end server, the PassThrough session EJB captures the<br />

message, then passes the message to the back-end server.<br />

108 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!