13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

server. For example, if the client uses SSL client authentication toauthenticate to the sending server, then the identity token to the downstreamserver will contain the certificate chain. This is important because it allows thereceiving server to perform it's own mapping of the certificate chain. Itenables more interoperability with other vendors and platforms.4. Once the identity format is understood and parsed, the identity is simplymapped to a credential. All identity token types map to the user ID field of theactive user registry. This is done by mapping Distinguished Name toDistinguished Name and using filters to allow administrators to control themapping.5. Some user registry methods are called to gather additional credentialinformation used by authorization. In a stateful server, this is done one timefor the sending server/receiving server pair where the identity tokens are thesame. Subsequent requests will be made via a session ID.Note: Identity Assertion is only available using the CSIv2 protocol.6.4.1 ScenariosThe following sections will describe five different cases where identity assertionis utilized to propagate credentials to downstream servers.The servers are running individual <strong>WebSphere</strong> Application Servers; they are notorganized in a cell. For more information on cell configuration and NetworkDeployment, refer to 10.15, “Cell <strong>Security</strong>” on page 337.Sample application for the scenariosA testing application is also distributed with this book, besides the ITSOBanksample application. It is the Identity Assertion sample application made fortesting purposes for the following scenarios (Scenario 1, 2, 3 and 4).The application is very simple, it consists three modules:► A J2EE client► An EJB module for the front-end server► An EJB module for the back-end serverThe application does the following:1. The client sends a message to the front-end server.2. On the front-end server, the PassThrough session EJB captures themessage, then passes the message to the back-end server.108 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!