22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.2.1 Authentication<br />

With LTPA as the authentication mechanism, a trusted third party server is used<br />

to authenticate the user. Depending on whether a token has already been issued<br />

to the user, there are two possible actions a Web server might perform. The two<br />

actions or mechanisms are:<br />

1. Creation (encoding) the LTPA token by the initial server the user logs into<br />

2. Interrogation (decoding) of an LTPA token provided by the browser in the<br />

HTTP request to a server<br />

LTPA token creation (encoding)<br />

Users are authenticated once per session. The initial authentication using LTPA<br />

is based on a name and password stored in an LDAP directory, where the<br />

directory is trusted by all the applications that are to share the LTPA session<br />

cookie. Note that the LDAP directory server is referred to as a “trusted third<br />

party,” hence the part of the name: “Third Party Authentication.” When a user<br />

provides a logon name (ID) and password to the initial server in the LTPA<br />

environment, it provides these credentials in a bind request against the LDAP<br />

directory server. The LDAP directory server hashes the password string, then it<br />

is compared to the stored password hash value in the user’s record in the<br />

directory. If the hash from the logon matches the hash stored in the directory, the<br />

“bind” is successful. Upon a successful LDAP bind, the initial Web server<br />

(typically a portal server) will generate an LTPA token and provide this cookie<br />

back to the browser. The browser will then provide this cookie in every<br />

subsequent HTTP request by the user to servers that are within the domain listed<br />

in the cookie. The amount of information contained in the cookie is relatively<br />

minimal, hence the term “Lightweight.” The structure of an LTPA token is shown<br />

in Table 7-1.<br />

Table 7-1 LTPA token data definition<br />

Data Value<br />

CookieName "LtpaToken"<br />

CookieValue Base64Encoded(LtpaToken)<br />

LtpaToken Encrypt(AuthenticationToken, SharedKey) using 3DES<br />

AuthenticationToken UserData+"%"+TokenExpirationDate+"%"+<br />

Base64Encoded(DigitalSignature)<br />

DigitalSignature Sign (UserData, TokenExpirationDate) using PrivateKey-ltpa.<br />

(using RSA/SHA1)<br />

Chapter 7. Single sign-on 287

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!