03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

LTPA does not necessarily require that a reverse proxy be involved in<br />

authentication. For example, a user can receive an LTPA cookie from a Domino<br />

server after successful authentication, and then use that cookie when<br />

communicating with a <strong>WebSphere</strong> Application Server which trusts the LTPA<br />

token issued by the Domino server. In real-world applications, however,<br />

authentication is usually performed by a reverse proxy, and the rest of this<br />

discussion will assume that scenario, as shown in Figure 12-4.<br />

User Registry<br />

Client<br />

1. Request<br />

2. Auth. Challenge<br />

WebSEAL<br />

c_user<br />

c_pwd<br />

4. Authenticate<br />

3. Challenge<br />

Response<br />

BA Header:<br />

c_user:c_pwd<br />

LTPA<br />

Cookie<br />

LTPAToken:<br />

User: c_user<br />

5: Request<br />

7: Response 6: Response<br />

LTPA<br />

<strong>WebSphere</strong><br />

Application Server<br />

user:<br />

c_user<br />

Figure 12-4 LTPA Information flow<br />

1. An unauthenticated client issues a request for a secure resource which is<br />

intercepted by the reverse proxy (WebSEAL).<br />

2. WebSEAL issues an HTTP authentication challenge to the client. Note that<br />

WebSEAL could be configured to provide a login form instead, but the overall<br />

flow of information would remain the same.<br />

3. The client responds to the authentication challenge with a new request<br />

containing the client’s userid (c_user) and password (c_pwd) in the HTTP<br />

Basic Authenticaion (BA) Header.<br />

4. WebSEAL authenticates the user against the user registry using c_user and<br />

c_pwd.<br />

5. WebSEAL constructs an LTPA token and attaches it to an LTPA cookie which<br />

is associated with the request sent to the <strong>WebSphere</strong> Application Server.<br />

WebSEAL can (and should) filter the client’s username and password out of<br />

the BA Header in the request sent to <strong>WebSphere</strong> because <strong>WebSphere</strong> will<br />

not need this information. When <strong>WebSphere</strong> requests the LTPA cookie from<br />

WebSEAL, it decrypts the LTPA token and verifies that the signature is<br />

Chapter 12. Tivoli Access Manager 387

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!