IBM BS029ML Self Help Guide - Page 165

Security cache timeout, LTPA settings, Security, Global Security, Authentication, mechanisms

Page 165 highlights

Security cache timeout WebSphere Application Server caches security information related to each authenticated user to save, repeating subsequent User-Registry lookups when a user's security credential expires. This setting controls how long, in seconds, that information is retained before being discarded. As User-Registry lookups ultimately impact performance, we typically recommend that the security cache timeout be increased from the default value. The only exception to this rule might be when modifications to the underlying User-Registry are made, such as invalidating a user after several failed login attempts. In which case, the security cache has the potential to become stale and invalid. To view or modify the Global Security Settings from the WebSphere Application Server Administrative Console, select Security → Global Security. Table 5-8 shows the default and recommended values. Table 5-8 Global security settings Parameter Cache Timeout Default value 600 Recommended value 6000 LTPA settings Successfully authenticated users receive a Lightweight Third-Party Authentication (LTPA) token containing a credential that can be delegated in the form of an encrypted transient cookie. This cookie is only valid for the duration of a user's browser session and is used through the embedded LTPA token to honor subsequent requests that would otherwise require reauthentication. However, the LTPA token is in itself subject to expiry even if a user's browser session is maintained. Effectively, the LTPA token starts to time out immediately upon creation. As it is envisaged that users will log in to the Portal at the beginning of the day and maintain a degree of interaction with the system throughout the day, we suggest that the LTPA Timeout be modified to reflect this period. The validity of the LTPA token is also of concern for environments implementing single sign-on (SSO). To view or modify the LTPA Settings from the WebSphere Application Server Administrative Console, select Security → Global Security → Authentication → Authentication mechanisms → LTPA. Table 5-9 shows the default and recommended values. Table 5-9 LTPA settings Parameter Default value LTPA Timeout 120 LDAP Search Timeout 120 LDAP Reuse Connection Enabled a. Dependant on the period of authentication validity required. Recommended value 480a 120 Enabled One very important parameter with regards to performance and security is the ability to reuse the connection that WebSphere Application Server establishes to the chosen LDAP Directory Server. By default, this parameter "Reuse connection" is enabled. Consideration: In addition to the LTPA Timeout (absolute), the value defined for the HttpSession Timeout (relative) can impact the behavior of the Portal. Chapter 5. WebSphere Portal runtime and services 151

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

Chapter 5. WebSphere Portal runtime and services
151
Security cache timeout
WebSphere Application Server caches security information related to each authenticated
user to save, repeating subsequent User-Registry lookups when a user’s security credential
expires. This setting controls how long, in seconds, that information is retained before being
discarded. As User-Registry lookups ultimately impact performance, we typically recommend
that the security cache timeout be increased from the default value. The only exception to this
rule might be when modifications to the underlying User-Registry are made, such as
invalidating a user after several failed login attempts. In which case, the security cache has
the potential to become stale and invalid.
To view or modify the Global Security Settings from the WebSphere Application Server
Administrative Console, select
Security
Global Security
. Table 5-8 shows the default and
recommended values.
Table 5-8
Global security settings
LTPA settings
Successfully authenticated users receive a Lightweight Third-Party Authentication (LTPA)
token containing a credential that can be delegated in the form of an encrypted transient
cookie. This cookie is only valid for the duration of a user’s browser session and is used
through the embedded LTPA token to honor subsequent requests that would otherwise
require reauthentication. However, the LTPA token is in itself subject to expiry even if a user’s
browser session is maintained. Effectively, the LTPA token starts to time out immediately upon
creation.
As it is envisaged that users will log in to the Portal at the beginning of the day and maintain a
degree of interaction with the system throughout the day, we suggest that the LTPA Timeout
be modified to reflect this period. The validity of the LTPA token is also of concern for
environments implementing single sign-on (SSO).
To view or modify the LTPA Settings from the WebSphere Application Server Administrative
Console, select
Security
Global Security
Authentication
Authentication
mechanisms
LTPA
. Table 5-9 shows the default and recommended values.
Table 5-9
LTPA settings
One very important parameter with regards to performance and security is the ability to reuse
the connection that WebSphere Application Server establishes to the chosen LDAP Directory
Server. By default, this parameter
Reuse connection” is enabled.
Parameter
Default value
Recommended value
Cache Timeout
600
6000
Parameter
Default value
Recommended value
LTPA Timeout
120
480
a
a. Dependant on the period of authentication validity required.
LDAP Search Timeout
120
120
LDAP Reuse Connection
Enabled
Enabled
Consideration:
In addition to the LTPA Timeout (absolute), the value defined for the
HttpSession Timeout (relative) can impact the behavior of the Portal.