IBM BS029ML Self Help Guide - Page 103

User registry and member repository, external ID, extId, user registry, member repository

Page 103 highlights

When an application, such as WebSphere Portal, uses Member Manager, the application may have its own application-specific repository for data that is related to the member in Member Manager. This means the application needs a linkage for the data of a member managed by Member Manager and its own application-specific data for the same member. Since the memberDN may be changed and reused, in general it is not suitable to be used as the linkage. However, memberUniqueId, which is unique, static, and never reused, is suitable to be used as the linkage. Still, with the previous example, the memberDN of "Jane Doe" was changed, but her application data should be still linked by the memberUniqueId. Thus, this is why memberUniqueId is recommended to be static and never changed. If this "Jane Doe" leaves the company and a new "Jane Doe" joins the same company, the second "Jane Doe" may have the same memberDN, but she would not be able to access the application data in the system, because the memberUniqueId is different. In the context of WebSphere Portal, only two member types, Person and Group, are supported. In WebSphere Portal, the member unique identifier (memberUniqueId) is called external ID, or extId. In Version 6 of WebSphere Portal, Portal Access Control (PAC) utilizes extId as the primary key in permission database tables, linking the users and groups to the access control data. 4.1.3 User registry and member repository In the context of WebSphere Application Server, a user registry stores all user and group data, including the user login ID and password, other user and group attributes, user and group membership information, and so on. In the context of WebSphere Application Server global security, three user registry types are supported. They are the Local Operating System user registry, Lightweight Directory Access Protocol (LDAP) user registry, and custom user registry (CUR). In some corporations, the existing directory servers, such as LDAP servers, are not capable of handling their needs. For example, a recent merger of two companies cannot consolidate their employees into a single directory in a short period. They may have to run their businesses to accommodate the two coexisting sub-directory server systems. In this case, WebSphere Application Server provides an Application Programming Interface (API) for customers to develop their own custom user registry (CUR). They can also consider other solutions, such as Tivoli Directory Integrator, to provide integration of their multiple directory systems. Within WebSphere Portal, only LDAP and custom user registries are supported, not the Local Operating System, because of the configuration of the Lightweight Third-Party Authentication (LTPA) mechanism used in Single Sign-On (SSO). In the context of WebSphere Portal and Member Manager, a member repository is the store for user profile data and the group data, and their membership information. Two different terms (user registry and member repository) are used because it is possible for the datastores to be different. For example, when the portal server requires application specific user attributes that are not available in the LDAP server, the administrator can opt to use the LookAside mechanism provided by WebSphere Member Manager. Thus, the member repository has the extension in the LookAside database tables. In most cases, however, the user registry and member repository are in the same datastores. WMM supports three types of member repositories: database (DB), LDAP, and custom member repository (CMR). In the database member repository (WMMUR DB), WMM had provided its own Custom User Registry (CUR) implementation (using the CUR API provided by WebSphere Application Server) to be used in the application server security configuration. Chapter 4. WebSphere Portal security 89

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

Chapter 4. WebSphere Portal security
89
When an application, such as WebSphere Portal, uses Member Manager, the application
may have its own application-specific repository for data that is related to the member in
Member Manager. This means the application needs a linkage for the data of a member
managed by Member Manager and its own application-specific data for the same member.
Since the memberDN may be changed and reused, in general it is not suitable to be used as
the linkage. However, memberUniqueId, which is unique, static, and never reused, is suitable
to be used as the linkage. Still, with the previous example, the memberDN of “Jane Doe” was
changed, but her application data should be still linked by the memberUniqueId. Thus, this is
why memberUniqueId is recommended to be static and never changed. If this “Jane Doe”
leaves the company and a new “Jane Doe” joins the same company, the second “Jane Doe”
may have the same memberDN, but she would not be able to access the application data in
the system, because the memberUniqueId is different.
In the context of WebSphere Portal, only two member types, Person and Group, are
supported. In WebSphere Portal, the member unique identifier (memberUniqueId) is called
external ID
, or
extId
. In Version 6 of WebSphere Portal, Portal Access Control (PAC) utilizes
extId as the primary key in permission database tables, linking the users and groups to the
access control data.
4.1.3
User registry and member repository
In the context of WebSphere Application Server, a
user registry
stores all user and group
data, including the user login ID and password, other user and group attributes, user and
group membership information, and so on. In the context of WebSphere Application Server
global security, three user registry types are supported. They are the Local Operating System
user registry, Lightweight Directory Access Protocol (LDAP) user registry, and custom user
registry (CUR).
In some corporations, the existing directory servers, such as LDAP servers, are not capable
of handling their needs. For example, a recent merger of two companies cannot consolidate
their employees into a single directory in a short period. They may have to run their
businesses to accommodate the two coexisting sub-directory server systems. In this case,
WebSphere Application Server provides an Application Programming Interface (API) for
customers to develop their own custom user registry (CUR). They can also consider other
solutions, such as Tivoli Directory Integrator, to provide integration of their multiple directory
systems.
Within WebSphere Portal, only LDAP and custom user registries are supported, not the Local
Operating System, because of the configuration of the Lightweight Third-Party Authentication
(LTPA) mechanism used in Single Sign-On (SSO).
In the context of WebSphere Portal and Member Manager, a
member repository
is the store
for user profile data and the group data, and their membership information. Two different
terms (user registry and member repository) are used because it is possible for the
datastores to be different. For example, when the portal server requires application specific
user attributes that are not available in the LDAP server, the administrator can opt to use the
LookAside mechanism provided by WebSphere Member Manager. Thus, the member
repository has the extension in the LookAside database tables. In most cases, however, the
user registry and member repository are in the same datastores.
WMM supports three types of member repositories: database (DB), LDAP, and custom
member repository (CMR). In the database member repository (WMMUR DB), WMM had
provided its own Custom User Registry (CUR) implementation (using the CUR API provided
by WebSphere Application Server) to be used in the application server security configuration.