29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The authentication mechanism in <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> typically<br />

collaborates closely with a user registry. When performing authentication, the<br />

user registry is consulted. A successful authentication results in the creation of a<br />

credential, which is the internal representation of a successfully authenticated<br />

client user. The abilities of the credential are determined by the configured<br />

authorization mechanism.<br />

Depending on the type of client, the authentication information is sent by using<br />

different protocols:<br />

► Enterprise Beans clients use CSIv2.<br />

► Web clients use HTTP or HTTPS.<br />

Although <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> provides support for multiple<br />

authentication mechanisms, you can configure only a single active authentication<br />

mechanism at a time. <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> supports the following<br />

authentication mechanisms:<br />

► Lightweight Third Party Authentication (LTPA)<br />

► Kerberos<br />

► Rivest Shamir Adleman (RSA) token authentication<br />

Note: Simple <strong>WebSphere</strong> Authentication Mechanism (SWAM) is deprecated<br />

in <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong> and will be removed in a future release.<br />

Lightweight Third-Party Authentication (LTPA)<br />

LTPA is intended for distributed, multiple application server and machine<br />

environments. It supports forwardable credentials and single sign-on (SSO).<br />

LTPA can support security in a distributed environment through cryptography.<br />

This support permits LTPA to encrypt, digitally sign, and securely transmit<br />

authentication-related data, and later decrypt and verify the signature.<br />

When using LTPA, a token is created with the user information and an expiration<br />

time and is signed by the keys. The LTPA token is time sensitive. All product<br />

servers that participate in a protection domain must have their time, date, and<br />

time zone synchronized. If not, LTPA tokens appear prematurely expired and<br />

cause authentication or validation failures. When SSO is enabled, this token is<br />

passed to other servers through cookies for Web resources.<br />

If the receiving servers share the same keys as the originating server, the token<br />

can be decrypted to obtain the user information, which is then validated to make<br />

sure that it has not expired and that the user information in the token is valid in its<br />

registry. On successful validation, the resources in the receiving servers are<br />

accessible after the authorization check. All of the <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong><br />

processes in a cell (deployment manager, node agents, application servers)<br />

share the same set of keys. If key sharing is required between different cells,<br />

386 <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong>: <strong>Concepts</strong>, Planning, and Design

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!