IBM BS029ML Self Help Guide - Page 104

Single sign-on (SSO), LtpaToken

Page 104 highlights

For accessing the user profile and group information, WMM provides the Custom Member Repository (CMR) module. The two classes are: com.ibm.websphere.wmm.registry.WMMUserRegistry (CUR) com.ibm.ws.wmm.db.DatabaseRepository (CMR) and can be respectively found in the WebSphere Application Server security configuration and WMM configuration (wmm.xml). When a customer user registry (CUR) is developed by the customer, a corresponding custom member repository (CMR) must be coded for configuring WMM. The CMR API is private and unpublished. To obtain this API, IBM support must be contacted and an non-disclosure agreement must be signed. The security of an out-of-box installation of WebSphere Portal Version 6 is enabled with the WMMUR DB option based on the embedded version of IBM Cloudscape Database. The idea is for the administrator to have a working system right after the installation. This configuration is suitable to a system for a fairly small scale experimental environment, like individual development or unit testing. In general, it is not recommended for a production environment. If the system will be put into production, the future growth and performance impact should warrant a better enterprise solution, based on a commercial database system and a directory server. Attention: We do not recommend the default out-of-box database configuration in a production environment, mainly for performance and management considerations. 4.1.4 Single sign-on (SSO) The power of WebSphere Portal is its capability of integrating and aggregating the applications running on the server and other enterprise information systems to present a single user interface. In most cases, the back-end enterprise applications require their own authentication and authorization to the users. Most implementations of the portal solution avoid the requirement of repeating authentication of the users. This is where SSO comes into play. The goal of single sign-on is to provide a secure method of authenticating a user one time within an environment and using that single authentication (for the duration of the session) as a basis for access to other applications, systems, and networks. In the context of IBM WebSphere Portal, there are two single sign-on realms: the realm from the client to portal and other Web applications and the realm from the portal to the back-end applications. WebSphere Application Server adopted an authentication mechanism called the Lightweight Third Party Authentication (LTPA) for single sign-on support. The LTPA protocol is intended to work in a distributed environment through cryptography. This support permits LTPA to encrypt, digitally sign, and securely transmit authentication-related data, and later decrypt and verify the signature. The LTPA protocol uses cryptographic keys to encrypt and decrypt user data that passes between servers. These keys must be shared between the different servers. The participant servers of the LTPA SSO must be configured to use the same LDAP or custom user registry. With LTPA enabled, a token is created with the user information and an expiration time, and it is signed by the keys. The LTPA token is time sensitive. All servers that participate in the single sign-on must have their time, date, and time zone synchronized. The LTPA token is passed in the HTTP header as a cookie, called LtpaToken. At the receiving end, the token is decrypted to obtain the user information. Due to the nature of sharing keys, it is important to guard the key files and WebSphere Application Server configuration files. 90 IBM WebSphere Portal V6 Self Help Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

90
IBM WebSphere Portal V6 Self Help Guide
For accessing the user profile and group information, WMM provides the Custom Member
Repository (CMR) module. The two classes are:
±
com.ibm.websphere.wmm.registry.WMMUserRegistry (CUR)
±
com.ibm.ws.wmm.db.DatabaseRepository (CMR)
and can be respectively found in the WebSphere Application Server security configuration
and WMM configuration (wmm.xml).
When a customer user registry (CUR) is developed by the customer, a corresponding custom
member repository (CMR) must be coded for configuring WMM. The CMR API is private and
unpublished. To obtain this API, IBM support must be contacted and an non-disclosure
agreement must be signed.
The security of an out-of-box installation of WebSphere Portal Version 6 is enabled with the
WMMUR DB option based on the embedded version of IBM Cloudscape Database. The idea
is for the administrator to have a working system right after the installation. This configuration
is suitable to a system for a fairly small scale experimental environment, like individual
development or unit testing. In general, it is not recommended for a production environment. If
the system will be put into production, the future growth and performance impact should
warrant a better enterprise solution, based on a commercial database system and a directory
server.
4.1.4
Single sign-on (SSO)
The power of WebSphere Portal is its capability of integrating and aggregating the
applications running on the server and other enterprise information systems to present a
single user interface. In most cases, the back-end enterprise applications require their own
authentication and authorization to the users. Most implementations of the portal solution
avoid the requirement of repeating authentication of the users. This is where SSO comes into
play.
The goal of single sign-on is to provide a secure method of authenticating a user one time
within an environment and using that single authentication (for the duration of the session) as
a basis for access to other applications, systems, and networks. In the context of IBM
WebSphere Portal, there are two single sign-on realms: the realm from the client to portal and
other Web applications and the realm from the portal to the back-end applications.
WebSphere Application Server adopted an authentication mechanism called the Lightweight
Third Party Authentication (LTPA) for single sign-on support.
The LTPA protocol is intended to
work in a distributed environment through cryptography. This support permits LTPA to
encrypt, digitally sign, and securely transmit authentication-related data, and later decrypt
and verify the signature. The LTPA protocol uses cryptographic keys to encrypt and decrypt
user data that passes between servers. These keys must be shared between the different
servers. The participant servers of the LTPA SSO must be configured to use the same LDAP
or custom user registry. With LTPA enabled, a token is created with the user information and
an expiration time, and it is signed by the keys. The LTPA token is time sensitive. All servers
that participate in the single sign-on must have their time, date, and time zone synchronized.
The LTPA token is passed in the HTTP header as a cookie, called
LtpaToken
. At the receiving
end, the token is decrypted to obtain the user information. Due to the nature of sharing keys,
it is important to guard the key files and WebSphere Application Server configuration files.
Attention:
We do not recommend the default out-of-box database configuration in a
production environment, mainly for performance and management considerations.