IBM BS029ML Self Help Guide - Page 166

WebSphere session management tuning, Advanced LDAP filters

Page 166 highlights

Advanced LDAP filters We highly recommend that the WebSphere advanced LDAP security filter settings are checked for the most appropriate values according to your chosen LDAP directory server. Failing to corroborate these settings will not only lead to problems with authentication, but can also influence the overall performance of the authentication mechanism. Two approaches exist for finding LDAP group details. The first uses the GroupFilter to search for groups based on a specified objectclass, for example, groupOfUniqueNames. This is the same approach taken when searching for users with the UserFilter. Unfortunately, this approach scales poorly with large numbers of groups and with large group memberships. To overcome this issue, many LDAP directory servers now support the listing of groups for which a user is a member as an operational attribute on the actual user object. For example, Active Directory uses the memberOf attribute to hold group membership entries. The correct value should therefore be defined in the Group Member ID Map field. If the attribute is not present, then WebSphere will use the alternative GroupFilter search approach. To view or modify the Advanced LDAP Settings from the WebSphere Application Server Administrative Console, select Security → Global Security → User Registries → LDAP → Advanced LDAP Settings. Table 5-10 shows the recommended value. Table 5-10 Advanced LDAP settings Parameter Group Member ID Map Recommended value Value from Table 5-15 (See InfoCenter) Note: The Lotus Domino LDAP implementation only supports the indirect method to locate the group memberships for a user. As such, it is not possible to determine the group membership of a given user by querying the user object directly. Instead, group membership is achieved by iteratively searching through the member list of all groups. 5.2.8 WebSphere session management tuning User interactions with WebSphere Portal Server are maintained through the use of a HttpSession. This provides a way to preserve data across multiple pages or requests on an individual user basis. It follows therefore that the size of the HttpSession object and the size of the permissible Java heap directly influence the number of users that Portal can concurrently support. Of course, scalability issues can be addressed by WebSphere cloning. In order to reduce Java heap memory consumption, we typically recommend that the HttpSession timeout setting be reduced from the default value of 30 minutes to 10 minutes. Adopting this approach will then expire the HttpSessions more rapidly, due to the reduced inactivity timeout period and allow Java garbage collection (GC) to eventually reclaim the memory back to the Java heap. To view or modify the Session Management Settings from the WebSphere Application Server Administrative Console, select Servers → Application Servers → WebSphere_Portal → Container Settings → Web Container Settings → Session Management. Table 5-11 on page 153 shows the default and recommended values. 152 IBM WebSphere Portal V6 Self Help Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

152
IBM WebSphere Portal V6 Self Help Guide
Advanced LDAP filters
We highly recommend that the WebSphere advanced LDAP security filter settings are
checked for the most appropriate values according to your chosen LDAP directory server.
Failing to corroborate these settings will not only lead to problems with authentication, but can
also influence the overall performance of the authentication mechanism.
Two approaches exist for finding LDAP group details. The first uses the GroupFilter to search
for groups based on a specified objectclass, for example, groupOfUniqueNames. This is the
same approach taken when searching for users with the UserFilter. Unfortunately, this
approach scales poorly with large numbers of groups and with large group memberships.
To overcome this issue, many LDAP directory servers now support the listing of groups for
which a user is a member as an operational attribute on the actual user object. For example,
Active Directory uses the memberOf attribute to hold group membership entries. The correct
value should therefore be defined in the Group Member ID Map field. If the attribute is not
present, then WebSphere will use the alternative GroupFilter search approach.
To view or modify the Advanced LDAP Settings from the WebSphere Application Server
Administrative Console, select
Security
Global Security
User Registries
LDAP
Advanced LDAP Settings
. Table 5-10 shows the recommended value.
Table 5-10
Advanced LDAP settings
5.2.8
WebSphere session management tuning
User interactions with WebSphere Portal Server are maintained through the use of a
HttpSession. This provides a way to preserve data across multiple pages or requests on an
individual user basis. It follows therefore that the size of the HttpSession object and the size of
the permissible Java heap directly influence the number of users that Portal can concurrently
support. Of course, scalability issues can be addressed by WebSphere cloning.
In order to reduce Java heap memory consumption, we typically recommend that the
HttpSession timeout setting be reduced from the default value of 30 minutes to 10 minutes.
Adopting this approach will then expire the HttpSessions more rapidly, due to the reduced
inactivity timeout period and allow Java garbage collection (GC) to eventually reclaim the
memory back to the Java heap.
To view or modify the Session Management Settings from the WebSphere Application Server
Administrative Console, select
Servers
Application Servers
WebSphere_Portal
Container Settings
Web Container Settings
Session Management
. Table 5-11 on
page 153 shows the default and recommended values.
Parameter
Recommended value
Group Member ID Map
Value from Table 5-15 (See InfoCenter)
Note:
The Lotus Domino LDAP implementation only supports the indirect method to locate
the group memberships for a user. As such, it is not possible to determine the group
membership of a given user by querying the user object directly. Instead, group
membership is achieved by iteratively searching through the member list of all groups.