03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Now that we have configured <strong>WebSphere</strong> for TAI support, and we have set up<br />

the trust relationship for our WebSEAL server, we can now define our SSL<br />

junction between WebSEAL and <strong>WebSphere</strong>. Note that when using TAI, you<br />

must define an SSL junction. TAI support is not provided by <strong>WebSphere</strong> on a<br />

non-SSL connection.<br />

We can now define a junction for our WebSEAL server to connect to <strong>WebSphere</strong><br />

using TAI. Create a user id and password in the user registry you are using for<br />

<strong>WebSphere</strong>, for example: tai_user with the password: tai_pwd. Issue the<br />

following command, with the right parameters for your environment, in pdadmin<br />

to create your junction:<br />

server task Webseald-WebSEALServer create -t SSL -c iv_user -B -U “WebSEALid”<br />

-W “WebSEALpassword” -h <strong>WebSphere</strong>ServerName -p SSLport /JunctionName<br />

►<br />

►<br />

►<br />

►<br />

►<br />

►<br />

WebSEALServer: the hostname of your WebSEAL server, for example:<br />

wsl01.<br />

WebSEALid: the user id you have created for your WebSEAL server. Note<br />

that if you have set the com.ibm.Websphere.security.Webseal.loginid, then<br />

you should specify a dummy id, and not the actual WebSEAL user id.<br />

WebSEALpassword: the password for your WebSEAL server.<br />

<strong>WebSphere</strong>ServerName: the hostname of your <strong>WebSphere</strong> server, for<br />

example: appsrv01.<br />

SSLport: the port number defined in <strong>WebSphere</strong> for SSL connections, for<br />

exmaple: 9443.<br />

JunctionName: the name for this junction, for example: /tai.<br />

After defining your junction, you will now be able to connect to <strong>WebSphere</strong> from<br />

WebSEAL. When you login to WebSEAL, and access your <strong>WebSphere</strong> server<br />

over your TAI junction, the Access Manager user id will be passed to, and used<br />

by, <strong>WebSphere</strong> when invoking your application. Your users will no longer see a<br />

basic authentication challenge from your application; instead, the user<br />

credentials passed by WebSEAL over the TAI junction will be used by<br />

<strong>WebSphere</strong>, and your users will not have to perform a second login.<br />

If you are reading on, something has probably gone wrong, and it appears that<br />

your TAI junction is not working. Never fear, your battle scarred veteran is here to<br />

lend a hand. We will need to turn on tracing in <strong>WebSphere</strong> to narrow down the<br />

problem. To begin, we will need to enable tracing, in order to perform this step,<br />

follow the instructions at Section , “<strong>Security</strong> trace” on page 235.<br />

Once your server has restarted, the first thing to look at is to see if TAI is actually<br />

enabled. In the example below we have included a portion of the trace file.<br />

Chapter 12. Tivoli Access Manager 401

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!