03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

also ask for a X.509 certificate file, although the response can be empty (just<br />

press Enter). In this case, the certificate check will not be made. For details on<br />

creating a digital certificate, refer to 10.9.1, “Generating a self-signed certificate”<br />

on page 264.<br />

8.4 Custom Trust Association Interceptor<br />

The application server can be configured to use a third-party product to provide<br />

authentication services, while continuing to perform authorisation. These<br />

products are often referred to as reverse proxy servers. To delegate the role of<br />

authentication to a reverse proxy, two conditions must be met.<br />

►<br />

►<br />

The reverse proxy must provide a Trust Association Interceptor, which<br />

<strong>WebSphere</strong> will use to receive requests from the reverse proxy server.<br />

A trust association between <strong>WebSphere</strong> and the reverse proxy must be<br />

established.<br />

In order to provide an interceptor, the<br />

com.ibm.websphere.security.TrustAssociationInterceptor interface, which<br />

defines three methods, must be implemented.<br />

►<br />

►<br />

►<br />

public boolean isTargetInterceptor(HttpServletRequest) throws<br />

com.ibm.websphere.security.WebTrustAssociationException<br />

Determines whether the request originated with the proxy server associated<br />

with the interceptor. The implementation code must examine the incoming<br />

request object and determine if the proxy server forwarding the request is a<br />

valid proxy server for this interceptor.<br />

public void validateEstablishedTrust(HttpServletRequest) throws<br />

com.ibm.websphere.security.WebTrustAssociationFailedException<br />

Determines whether or not the proxy server from which the request originated<br />

is trusted. This method is called after the isTargetInterceptor method. The<br />

implementation code must authenticate the proxy server. The authentication<br />

mechanism is proxy-server-specific.<br />

public String getAuthenticatedUsername(HttpServletRequest) throws<br />

com.ibm.websphere.security.WebTrustAssociationUserException<br />

The application server has accepted the proxy server's authentication of the<br />

request and must now authorise the request. This method extracts the<br />

request’s user name from the HTTP header to allow for authorisation.<br />

190 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!