03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.6.1 Single Sign-On<br />

Single Sign-On is the process whereby users provide their credentials, user<br />

identity, password and/or token, once within a session. These credentials are<br />

available to all enterprise applications for which Single Sign-On was enabled<br />

without prompting the user to reenter user name and password.<br />

The goal is for an enterprise to be able to have one network identity per user,<br />

allowing the centralized management of the various roles the user may have in<br />

different applications, so correct rules can be applied without duplication of either<br />

user data and without requiring multiple identities for the user.<br />

In practice, network identity management is not yet mature enough within most<br />

enterprises to achieve a single user registry, particularly when legacy<br />

applications are exposed to the Web. Different application servers have typically<br />

implemented their own security or utilized the operating environment security of<br />

the platform on which they have been deployed. The task is then to authenticate<br />

a user and provide, within the current session, a credential which can be passed<br />

through to, and understood by, each application.<br />

<strong>IBM</strong> has previously developed the Lightweight Third Party Authentication, (LTPA)<br />

mechanism enabling Single Sign-On between various application servers. A<br />

token, the transient cookie LtpaToken, is generated by the authenticating server;<br />

for this book we configured <strong>WebSphere</strong>, WebSeal and Domino in different<br />

scenarios to provide the LTPA token for Single Sign-On. The cookie is encrypted<br />

using LTPA keys which must be shared among all Single Sign-On participating<br />

servers, and contains user authentication information, the network domain in<br />

which it is valid for Single Sign-On, and an expiry time.<br />

The token is issued to the Web user in a cookie called a transient cookie; this<br />

means that the cookie resides in the browser memory, is not stored on the user’s<br />

computer system and expires when the user closes the browser. This cookie is<br />

easily recognized by its name: LtpaToken.<br />

The public domain has largely adopted Kerberos technology to provide the same<br />

functionality.<br />

Tivoli Access Manager, with its reverse proxy security server, WebSeal, provides<br />

a more robust mechanism for Single Sign-On which can be used in conjunction<br />

with LTPA and TAI (Trust Association Interceptor) provided as the Trust<br />

Association Mechanism (TAM). Access Manager can integrate most back-end<br />

application servers using the Global Sign-On mechanism to third party user<br />

registries or extensions to the TAM schema to include legacy user identities and<br />

passwords.<br />

Chapter 10. Administering <strong>WebSphere</strong> security 251

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!