IBM E02HRLL-G Administration Guide - Page 81

LDAP support for logon authentication, Using LDAP

Page 81 highlights

Chapter 7. LDAP support for logon authentication In addition to using WebSphere Partner Gateway partner registry for console authentication, WebSphere Partner Gateway supports Lightweight Directory Access Protocol (LDAP) container-based authentication that uses the WebSphere Application Server authentication mechanism. WebSphere Application Server supports 3 types of authentication: 1. LDAP registry 2. Local operating system registry 3. Custom registry WebSphere Partner Gateway uses WebSphere Application Server LDAP registry authentication. By enabling the container managed authentication in applications like WebSphere Partner Gateway which are deployed in WebSphere Application Server, the administrator can manage user authentication in a central location outside of the WebSphere Partner Gateway application. Using LDAP Use LDAP when Container based authentication is selected: v During installation. v By setting the attribute bcg.ldap.containerauth located in Console System Administration > Common Properties to True. Enabling the container managed authentication mechanism To enable the container managed authentication mechanism, set the bcg.ldap.containerauth property value to True in the WebSphere Partner Gateway console, then configure the WebSphere Application Server Global Security setting to use LDAP. After you have enabled the authentication, users are authenticated against the LDAP server when logging into WebSphere Partner Gateway. Note: When LDAP is enabled during the installation process, the administrator must ensure that the configured LDAP server is given a user named hubadmin, This is a valid logon user name for LDAP authentication regardless of whatever logon type is chosen. Enabling J2EE security About this task If you are enabling J2EE security in addition to WebSphere Application Server global security, create a policy file (for example: wpg.policy) for the Java Runtime Environment (JRE) granting the necessary security permissions. To add this file into the JRE, perform the following steps: 1. Make an entry in the java.security file residing in the WASND_ROOT/java/jre/ lib/security folder. The syntax for the new entry in the java.security file is: policy.url.3=file:///fully qualified path/wpg.policy 2. Restart all of the Java processes. © Copyright IBM Corp. 2007, 2008 75

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

Chapter 7. LDAP support for logon authentication
In addition to using WebSphere Partner Gateway partner registry for console
authentication, WebSphere Partner Gateway supports Lightweight Directory Access
Protocol (LDAP) container-based authentication that uses the WebSphere
Application Server authentication mechanism. WebSphere Application Server
supports 3 types of authentication:
1.
LDAP registry
2.
Local operating system registry
3.
Custom registry
WebSphere Partner Gateway uses WebSphere Application Server LDAP registry
authentication. By enabling the container managed authentication in applications
like WebSphere Partner Gateway which are deployed in WebSphere Application
Server, the administrator can manage user authentication in a central location
outside of the WebSphere Partner Gateway application.
Using LDAP
Use LDAP when Container based authentication is selected:
v
During installation.
v
By setting the attribute
bcg.ldap.containerauth
located in
Console System
Administration
>
Common Properties
to True.
Enabling the container managed authentication mechanism
To enable the container managed authentication mechanism, set the
bcg.ldap.containerauth
property value to
True
in the WebSphere Partner Gateway
console, then configure the WebSphere Application Server
Global Security
setting
to use LDAP. After you have enabled the authentication, users are authenticated
against the LDAP server when logging into WebSphere Partner Gateway.
Note:
When LDAP is enabled during the installation process, the administrator
must ensure that the configured LDAP server is given a user named hubadmin,
This is a valid logon user name for LDAP authentication regardless of whatever
logon type is chosen.
Enabling J2EE security
About this task
If you are enabling J2EE security in addition to WebSphere Application Server
global security, create a policy file (for example:
wpg.policy
) for the Java Runtime
Environment (JRE) granting the necessary security permissions. To add this file
into the JRE, perform the following steps:
1.
Make an entry in the
java.security
file residing in the
WASND_ROOT
/java/jre/
lib/security
folder.
The syntax for the new entry in the
java.security
file is:
policy.url.3=file:///
fully qualified path
/wpg.policy
2.
Restart all of the Java processes.
© Copyright IBM Corp. 2007, 2008
75