IBM BS029ML Self Help Guide - Page 124

Anatomy of configuration files

Page 124 highlights

One of the often asked question is how we can see whether the browser has received the LTPA token, especially during debugging of single sign-on problems. If the browser supports JavaScript, the most straightforward way is to type javascript:alert(document.cookie) in the browser's location or URL field, as shown in Figure 4-7. Here you can see the LTPA token and JSESSIONID. Figure 4-7 LTPA token shown by "javascript:alert(document.cookie" 4.3.4 Anatomy of configuration files Here we discuss the anatomy of the configuration files. Configuration files for WebSphere Application Server global security In the context of the chapter, represents the directory root where WebSphere Portal is installed. For example: Windows: C:\IBM\WebSphere\PortalServer UNIX/Linux: /opt/IBM/WebSphere/PortalServer and is the root directory of the WebSphere Application Server profile. Depending on whether the system is standalone or in a cluster, this means two different directories. For example: Windows: C:\IBM\WebSphere\AppServer\profiles\wp_profile UNIX/Linux: /opt/IBM/WebSphere/AppServer/profiles/wp_profile security.xml This is the configuration file for the WebSphere Application Server global security. Whenever a security problem is encountered, this is the first file to be examined. There is only one copy of this file for a cell. Its location is at /config/cells/. Do not put another copy in any of the subdirectories. A "skeleton" of the file is shown in Example 4-3. We have omitted some of the content in the file to emphasize the information relevant to the our purposes. Example 4-3 Sample security.xml: the first segment ... 110 IBM WebSphere Portal V6 Self Help Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

110
IBM WebSphere Portal V6 Self Help Guide
One of the often asked question is how we can see whether the browser has received the
LTPA token, especially during debugging of single sign-on problems. If the browser supports
JavaScript, the most straightforward way is to type
javascript:alert(document.cookie)
in
the browser’s location or URL field, as shown in Figure 4-7. Here you can see the LTPA token
and JSESSIONID.
Figure 4-7
LTPA token shown by “javascript:alert(document.cookie”
4.3.4
Anatomy of configuration files
Here we discuss the anatomy of the configuration files.
Configuration files for WebSphere Application Server global security
In the context of the chapter,
<portal_root>
represents the directory root where WebSphere
Portal is installed. For example:
±
Windows: C:\IBM\WebSphere\PortalServer
±
UNIX/Linux: /opt/IBM/WebSphere/PortalServer
and
<wsas_profile_root>
is the root directory of the WebSphere Application Server profile.
Depending on whether the system is standalone or in a cluster, this means two different
directories. For example:
±
Windows: C:\IBM\WebSphere\AppServer\profiles\wp_profile
±
UNIX/Linux: /opt/IBM/WebSphere/AppServer/profiles/wp_profile
security.xml
This is the configuration file for the WebSphere Application Server global security. Whenever
a security problem is encountered, this is the first file to be examined. There is only one copy
of this file for a cell. Its location is at <wsas_profile_root>/config/cells/<cellname>. Do not put
another copy in any of the subdirectories.
A “skeleton” of the file is shown in Example 4-3. We have omitted some of the content in the
file to emphasize the information relevant to the our purposes.
Example 4-3
Sample security.xml: the first segment
<?xml version="1.0" encoding="UTF-8"?>
<security:Security xmi:version="2.0" ...
enabled
="true" cacheTimeout="600" ...
activeAuthMechanism="LTPA_1"
activeUserRegistry
="CustomUserRegistry_1"
defaultSSLSettings="SSLConfig_1">
...
<authMechanisms xmi:type="security:LTPA" xmi:id="LTPA_1" OID="oid:1.3.18.0.2.30.2"
authContextImplClass="com.ibm.ISecurityLocalObjectTokenBaseImpl.WSSecurityContextLTPAImpl"
authConfig="system.LTPA" simpleAuthConfig="system.LTPA" authValidationConfig="system.LTPA"
timeout="480" password="{xor}KzYyOms5KjE=">
<trustAssociation xmi:id="TrustAssociation_1" enabled="false">
<interceptors xmi:id="TAInterceptor_1"
interceptorClassName="com.ibm.ws.security.web.WebSealTrustAssociationInterceptor"/>