IBM BS029ML Self Help Guide - Page 147

Portal access control PAC, Security, Global security, JAAS Configuration, Application Logins

Page 147 highlights

[8/17/07 16:45:23:294 EDT] 2934440 ServletInstan E SRVE0100E: Did not realize init() exception thrown by servlet portal: javax.servlet.UnavailableException: Initialization of one or more services failed. In this case, an expired client certificate caused the system to fail. If there is any message related to the SSL handshake, you need to check the client certificate created when the TAM runtime was configured on WebSphere Application Server. Enable traces on TAM In certain cases, it is desirable to enable the WebSEAL traces along with those in WebSphere Application Server and Portal. To enable the WebSEAL Web traces, run the following commands from the PDAdmin console: pdadmin> server task trace set pdweb.debug 9 file path=C:\temp\webseald.trace\pdweb.debug pdadmin> server task trace set pdweb.snoop 9 file path=C:\temp\webseald.trace\pdweb.snoop To disable these traces: run these commands: pdadmin> server task trace set pdweb.snoop 0 pdadmin> server task trace set pdweb.debug 0 If the problem is with authorization with TAM, we recommend adding a "debug=true" custom attribute to the PDLoginModule in the WebSphere Application Server administrative console (select Security → Global security → JAAS Configuration → Application Logins → Portal_Login → JAAS Login Modules → com.tivoli.mts.PDLoginModule → Custom properties and add debug as the name and true as the value). This will generate debug information to the SystemOut.log upon logging in similar to Example 4-22. Example 4-22 PDLoginModule debug output [5/26/07 14:46:02:346 EDT] 13de60b4 SystemOut com.tivoli.mts.PDLoginModule [5/26/07 14:46:02:346 EDT] 13de60b4 SystemOut loader [5/26/07 14:46:02:456 EDT] 13de60b4 SystemOut [5/26/07 14:46:02:687 EDT] 13de60b4 SystemOut PDPrincipal [5/26/07 14:46:02:697 EDT] 13de60b4 SystemOut PDCredential O delegate class name: O Using the current thread class O user_dn is null O [PDLoginModule]: added O [PDLoginModule]: added To reconfigure TAM configuration, do not simply disable security. The TAM settings have to be manually removed from the Portal configuration before trying to disable security. Portal access control (PAC) When debugging PAC related problems, check the following: Make sure that the user is indeed in the group (if permissions were assigned to groups). One simple test is to assign the user individually and see if that helps. Use the XMLAccess utility to generate an export of the object tree, and follow the tree to check that the roles are assigned. If rights should not be given and you cannot discover where they were set, check for the virtual principals of which all users are members. Chapter 4. WebSphere Portal security 133

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

Chapter 4. WebSphere Portal security
133
[8/17/07 16:45:23:294 EDT]
2934440 ServletInstan E SRVE0100E: Did not realize
init() exception thrown by servlet portal: javax.servlet.UnavailableException:
Initialization of one or more services failed.
In this case, an expired client certificate caused the system to fail.
If there is any message related to the SSL handshake, you need to check the client certificate
created when the TAM runtime was configured on WebSphere Application Server.
Enable traces on TAM
In certain cases, it is desirable to enable the WebSEAL traces along with those in WebSphere
Application Server and Portal. To enable the WebSEAL Web traces, run the following
commands from the PDAdmin console:
pdadmin> server task <webseald-server> trace set pdweb.debug 9 file
path=C:\temp\webseald.trace\pdweb.debug
pdadmin> server task <webseald-server> trace set pdweb.snoop 9 file
path=C:\temp\webseald.trace\pdweb.snoop
To disable these traces: run these commands:
pdadmin> server task <webseald-server> trace set pdweb.snoop 0
pdadmin> server task <webseald-server> trace set pdweb.debug 0
If the problem is with authorization with TAM, we recommend adding a “debug=true” custom
attribute to the PDLoginModule in the WebSphere Application Server administrative console
(select
Security
Global security
JAAS Configuration
Application Logins
Portal_Login
JAAS Login Modules
com.tivoli.mts.PDLoginModule
Custom
properties
and add debug as the name and true as the value). This will generate debug
information to the SystemOut.log upon logging in similar to Example 4-22.
Example 4-22
PDLoginModule debug output
[5/26/07 14:46:02:346 EDT] 13de60b4 SystemOut
O delegate class name:
com.tivoli.mts.PDLoginModule
[5/26/07 14:46:02:346 EDT] 13de60b4 SystemOut
O Using the current thread class
loader
[5/26/07 14:46:02:456 EDT] 13de60b4 SystemOut
O user_dn is null
[5/26/07 14:46:02:687 EDT] 13de60b4 SystemOut
O [PDLoginModule]: added
PDPrincipal
[5/26/07 14:46:02:697 EDT] 13de60b4 SystemOut
O [PDLoginModule]: added
PDCredential
To reconfigure TAM configuration, do not simply disable security. The TAM settings have to be
manually removed from the Portal configuration before trying to disable security.
Portal access control (PAC)
When debugging PAC related problems, check the following:
±
Make sure that the user is indeed in the group (if permissions were assigned to groups).
One simple test is to assign the user individually and see if that helps.
±
Use the XMLAccess utility to generate an export of the object tree, and follow the tree to
check that the roles are assigned.
±
If rights should not be given and you cannot discover where they were set, check for the
virtual principals of which all users are members.