03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 12-4 Trust Association Interceptor properties<br />

Property<br />

com.ibm.Websphere.security.Webseal.id<br />

com.ibm.Websphere.security.Webseal.hostname<br />

value<br />

iv-user<br />

wsl01<br />

the name of the WebSEAL server<br />

com.ibm.Websphere.security.Webseal.ports 443<br />

Because we are using an SSL<br />

connection<br />

Tip: From a battle scarred veteran<br />

<strong>WebSphere</strong>, when receiving a connection request over a TAI connection, uses<br />

this value when validating security credentials. To do this, it uses only the<br />

hostname of the requestor, and not the fully qualified DNS name. If you enter<br />

the full DNS name here, you will find that the request will not be processed by<br />

<strong>WebSphere</strong> TAI, and the user identity used for the request will be that of the<br />

WebSEAL server. This is probably not the result you wish to achieve.<br />

If you chose yet again to ignore my advice, then I must assume that you really<br />

like the company of your lab machines.<br />

9. Once you have completed entering your properties, on the left pane, select<br />

<strong>Security</strong> -> Global <strong>Security</strong>.<br />

10.The Enabled box should already be selected. If you have not yet configured<br />

security for your <strong>WebSphere</strong> Server, you should go back and do so now,<br />

before continuing. Assuming you already have security enabled, scroll down<br />

the right pane, and in the Active Authentication Mechanism field, select LTPA.<br />

Select the OK button, and save your configuration.<br />

11.Finally restart your <strong>WebSphere</strong> server to continue.<br />

Configure the WebSEAL Server<br />

Now that you have <strong>WebSphere</strong> configured for TAI support to WebSEAL, we must<br />

get our WebSEAL server set up and configured. To do so, we must first set up<br />

our trust association between WebSEAL and <strong>WebSphere</strong>. To do this, follow<br />

these next steps.<br />

1. In our example, we are using the sample keyring files installed with<br />

<strong>WebSphere</strong>. Note that if you have obtained certificates for your <strong>WebSphere</strong><br />

server, you may skip this step, and proceed to step 5 below to import the<br />

signer certificate for WebSEAL. To begin, start the ikeyman utility for<br />

<strong>WebSphere</strong>, and open the server key file for <strong>WebSphere</strong>. Open the<br />

DummyServerKeyFile.jks in the \etc directory. You will<br />

Chapter 12. Tivoli Access Manager 399

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!