IBM BS029ML Self Help Guide - Page 114

Integration with Tivoli Access Manager (TAM)

Page 114 highlights

You can extend an existing standard LDAP objectclass such as inetOrgPerson to incorporate the new attributes. This must be done using the LDAP server utility and in the LDAP server. In the WebSphere Member Manager (WMM), you need to add this new objectclass for read or write objectclasses in wmm.xml. For example, assume the new objectclass you defined is called acmePerson. This objectclass should be added in wmm.xml, as shown in Example 4-1. Example 4-1 Customized objectclass acmePerson added in wmm.xml The attributes introduced in this customized objectclass should be added to both wmmAttributes.xml and wmmLDAPServerAttributes.xml. You can also use the LookAside repository provided by WMM, with the understanding that the LDAP server is read-only or that extending an objectclass is not feasible. To enable LookAside, we recommend that you set "LookAside" to true in wpconfig.properties when enabling security configuration. We also recommend that you add the new attributes into wmmLAAttributes.xml and wmmAttributes.xml before running the security configuration task. If you are not able to decide what attributes to add before enabling security, then you can add the attributes to LookAside DB tables later using the utility "attributeloader" provided by WMM. The process was documented in TechNote 1225316, which can be searched for at: http://www-306.ibm.com/software/genservers/portal/support/ 4.2.5 Integration with Tivoli Access Manager (TAM) The most common configuration of the integration is for the portal to take advantage of TAM's centralized security infrastructure, use WebSEAL as its reverse proxy, and leverage the Trust Association mechanism provided by the WebSphere Application Server. WebSphere Portal has designed a set of configuration tasks to configure portal servers for authentication, authorization, and vault adapter. In order to integrate WebSphere Portal with Tivoli Access Manager and WebSEAL, you must first configure the portal security with native WebSphere Application Server, and verify that it is working correctly with its single sign-on mechanism. Important: WebSphere Portal security must be configured and tested correctly before configuring TAM or any other external security managers. The portal configuration tasks for TAM integration are enable-tam-all, enable-tam-tai, enable-tam-authorization, and action-esm-tam-update-vaultservice. enable-tam-all is simply a combination of the other three sub-tasks. These tasks are designed to work under general configurations, and to provide a convenient interface for customers to use. If special treatments are required, manual steps should be taken after running them. Before the portal server can talk to the TAM Java Runtime (AMJRTE), certain conditions must be set by the configuration task run-svrssl-config, which runs two PDadmin utilities PDJrteCfg and SvrSslCfg sequentially. This task creates a user account and server entries that represent the WebSphere Portal, and in addition, the file PdPerm.properties and a Java key store file are created locally under the Java runtime directory on the portal server box. This 100 IBM WebSphere Portal V6 Self Help Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

100
IBM WebSphere Portal V6 Self Help Guide
You can extend an existing standard LDAP objectclass such as inetOrgPerson to incorporate
the new attributes. This must be done using the LDAP server utility and in the LDAP server. In
the WebSphere Member Manager (WMM), you need to add this new objectclass for read or
write objectclasses in wmm.xml. For example, assume the new objectclass you defined is
called acmePerson. This objectclass should be added in wmm.xml, as shown in Example 4-1.
Example 4-1
Customized objectclass acmePerson added in wmm.xml
<supportedLdapEntryType name="Person"
rdnAttrTypes="uid"
objectClassesForRead="inetOrgPerson;
acmePerson
"
objectClassesForWrite="inetOrgPerson;
acmePerson
"
searchBases="ou=people,ou=dept,o=acme.com"/>
The attributes introduced in this customized objectclass should be added to both
wmmAttributes.xml and wmmLDAPServerAttributes.xml.
You can also use the LookAside repository provided by WMM, with the understanding that the
LDAP server is read-only or that extending an objectclass is not feasible. To enable
LookAside, we recommend that you set “LookAside” to true in wpconfig.properties when
enabling security configuration. We also recommend that you add the new attributes into
wmmLAAttributes.xml and wmmAttributes.xml before running the security configuration task.
If you are not able to decide what attributes to add before enabling security, then you can add
the attributes to LookAside DB tables later using the utility “attributeloader” provided by
WMM. The process was documented in TechNote 1225316, which can be searched for at:
http://www-306.ibm.com/software/genservers/portal/support/
4.2.5
Integration with Tivoli Access Manager (TAM)
The most common configuration of the integration is for the portal to take advantage of TAM’s
centralized security infrastructure, use WebSEAL as its reverse proxy, and leverage the Trust
Association mechanism provided by the WebSphere Application Server. WebSphere Portal
has designed a set of configuration tasks to configure portal servers for authentication,
authorization, and vault adapter.
In order to integrate WebSphere Portal with Tivoli Access Manager and WebSEAL, you must
first configure the portal security with native WebSphere Application Server, and verify that it
is working correctly with its single sign-on mechanism.
The portal configuration tasks for TAM integration are enable-tam-all, enable-tam-tai,
enable-tam-authorization, and action-esm-tam-update-vaultservice. enable-tam-all is simply
a combination of the other three sub-tasks. These tasks are designed to work under general
configurations, and to provide a convenient interface for customers to use. If special
treatments are required, manual steps should be taken after running them.
Before the portal server can talk to the TAM Java Runtime (AMJRTE), certain conditions must
be set by the configuration task run-svrssl-config, which runs two PDadmin utilities PDJrteCfg
and SvrSslCfg sequentially. This task creates a user account and server entries that
represent the WebSphere Portal, and in addition, the file PdPerm.properties and a Java key
store file are created locally under the Java runtime directory on the portal server box. This
Important:
WebSphere Portal security must be configured and tested correctly before
configuring TAM or any other external security managers.