IBM BS029ML Self Help Guide - Page 142

/12/07 11:17:03:153 CDT] 04d SecurityColla A, 6/12/07 11:16:37:824 CDT] 04d LTPAServerObj E

Page 142 highlights

Association Interceptor configuration. Further investigation should be done with the traces enabled, using the trace strings given in Table 4-5 on page 107. The more complicated cases are from the failure of multiple servers. Besides the things mentioned above, you may want to verify the following: All participating servers share the same DNS domain, which should be the one configured as the SSO domain. As stated before, the SSO domain cannot be blank in this case. All participating servers share the same LTPA key. All participating servers are configured to the same user registry and port number, for example, LDAP. A couple of cases are given in Example 4-17 and Example 4-18. Example 4-17 SSO failure case: mismatched realm [6/12/07 11:16:37:762 CDT] 0000004d LTPAServerObj E SECJ0375E: Mismatch of realms during token validation. [6/12/07 11:16:37:824 CDT] 0000004d LTPAServerObj E SECJ0373E: Cannot create credential for the user due to failed validation of the LTPA token. The exception is com.ibm.websphere.security.CustomRegistryException: The realm in the token: tamdirprod.mayo.edu:389 does not match the current realm: WMMRealm [6/12/07 11:17:03:153 CDT] 0000004d SecurityColla A SECJ0053E: Authorization failed for WMMRealm/m024534 while invoking (Bean)ejb/MemberServiceHome getMember(com.ibm.websphere.wmm.datatype.MemberIdentifier,com.ibm.websphere.wmm.da tatype.StringSet):1 securityName: WMMRealm/testuser1;accessID: user:WMMRealm/uid=testuser1,ou=people,ou=dept,o=acme.com is not granted any of the required roles: Everyone This failure is due to the mismatched user registry realm. When WMMUR is configured, the default realm is "WMMRealm". If other systems are configured to use the realm, such as "corpldap.acem.com:389", the configuration in the global security of WebSphere Application Server must be configured to use the same realm. In the case of WMMUR, you need to add a custom property called userRegistryRealm and give the value to the shared user registry realm. This is shown in Example 4-4 on page 111. Example 4-18 SSO failure case: BadPaddingException [8/13/07 11:12:48:127 CDT] 00000097 LTPACrypto 3 BadPaddingException validating token, normal when token generated from other factory. Given final block not properly padded [8/13/07 11:12:48:127 CDT] 00000097 LTPACrypto 3 Total decryption time: 1 [8/13/07 11:12:48:127 CDT] 00000097 LTPAServerObj 3 Calling tokenFactory[2].validateTokenBytes() [8/13/07 11:12:48:127 CDT] 00000097 AuthzPropToke > AuthzPropToken from byte[] Entry [8/13/07 11:12:48:129 CDT] 00000097 AuthzPropToke 3 Before parsing, length: 169 string: B4> l

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

128
IBM WebSphere Portal V6 Self Help Guide
Association Interceptor configuration. Further investigation should be done with the traces
enabled, using the trace strings given in Table 4-5 on page 107.
The more complicated cases are from the failure of multiple servers. Besides the things
mentioned above, you may want to verify the following:
±
All participating servers share the same DNS domain, which should be the one configured
as the SSO domain. As stated before, the SSO domain cannot be blank in this case.
±
All participating servers share the same LTPA key.
±
All participating servers are configured to the same user registry and port number, for
example, LDAP.
A couple of cases are given in Example 4-17 and Example 4-18.
Example 4-17
SSO failure case: mismatched realm
[6/12/07 11:16:37:762 CDT] 0000004d LTPAServerObj E
SECJ0375E: Mismatch of
realms during token validation.
[6/12/07 11:16:37:824 CDT] 0000004d LTPAServerObj E
SECJ0373E: Cannot create
credential for the user <null> due to failed validation of the LTPA token. The
exception is com.ibm.websphere.security.CustomRegistryException: The realm in the
token: tamdirprod.mayo.edu:389 does not match the current realm: WMMRealm
[6/12/07 11:17:03:153 CDT] 0000004d SecurityColla A
SECJ0053E: Authorization
failed for WMMRealm/m024534 while invoking (Bean)ejb/MemberServiceHome
getMember(com.ibm.websphere.wmm.datatype.MemberIdentifier,com.ibm.websphere.wmm.da
tatype.StringSet):1 securityName: WMMRealm/testuser1;accessID:
user:WMMRealm/uid=testuser1,ou=people,ou=dept,o=acme.com is not granted any of the
required roles: Everyone
This failure is due to the mismatched user registry realm. When WMMUR is configured, the
default realm is “WMMRealm”. If other systems are configured to use the realm, such as
“corpldap.acem.com:389”, the configuration in the global security of WebSphere Application
Server must be configured to use the same realm. In the case of WMMUR, you need to add a
custom property called userRegistryRealm and give the value to the shared user registry
realm. This is shown in Example 4-4 on page 111.
Example 4-18
SSO failure case: BadPaddingException
[8/13/07 11:12:48:127 CDT] 00000097 LTPACrypto
3
BadPaddingException validating token, normal when token generated from other
factory.
Given final block not properly padded
[8/13/07 11:12:48:127 CDT] 00000097 LTPACrypto
3
Total decryption time: 1
[8/13/07 11:12:48:127 CDT] 00000097 LTPAServerObj 3
Calling
tokenFactory[2].validateTokenBytes()
[8/13/07 11:12:48:127 CDT] 00000097 AuthzPropToke > AuthzPropToken from byte[]
Entry
[8/13/07 11:12:48:129 CDT] 00000097 AuthzPropToke 3
Before parsing, length: 169
string: B4> l<jEQ hV 0rgk0E3l?
s <i.CXq] r% E{ w ??# #
H Sg)5"d ]p'B> Y e(Vq & $Z {0 ?_/K1W? ·[[\?] D k
&yS0P3[K]c?j!X?g1ØL!) ym N. 8%"EwY id ^? ?#kE(@gh 1Pp2;? VCtH) Tnm _j
[8/13/07 11:12:48:130 CDT] 00000097 AuthzPropToke 3
UserData delimiter not
found.
[8/13/07 11:12:48:130 CDT] 00000097 LTPAServerObj 3
security.ltpa.validate.verifytoken.failed