You can specify the token consumer on the application level. The token consumer information is used on the consumer side to incorporate the security token.
Complete the following steps to configure the token consumer on the application level:
On the application level, if you do not specify a security token in your deployment descriptor, the Part reference field is not displayed. If you define a security token called user_tcon in your deployment descriptor, user_tcon is displayed as an option in the Part reference field.
For example:
property name="trustedId_0", value="CN=Bob,O=ACME,C=US" property name="trustedId_1, value="user1"
If the distinguished name (DN) is used, the space is removed for comparison. See the programming model information in the documentation for an explanation of how to implement the com.ibm.wsspi.wssecurity.id.TrustedIDEvaluator interface. For more information, see Default implementations of the Web services security service provider programming interfaces.
Note: Define the trusted ID evaluator on the server level instead of the application level. To define the trusted ID evaluator on the server level, complete the following steps:
The trusted ID evaluator configuration is available only for the token consumer on the server-side application level.
URI | Local name | Description |
---|---|---|
A namespace URI is not applicable. | Specify http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3 as the local name value. | Specifies the name of an X.509 certificate token |
A namespace URI is not applicable. | Specify http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509PKIPathv1 as the local name value. | Specifies the name of the X.509 certificates in a PKI path |
A namespace URI is not applicable. | Specify http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#PKCS7 as the local name value. | Specifies a list of X509 certificates and certificate revocation lists (CRL) in a PKCS#7 |
Specify http://www.ibm.com/websphere/appserver/tokentype/5.0.2 as the URI value. | Specify LTPA as the local name value. | Specifies a binary security token that contains an embedded Lightweight Third Party Authentication (LTPA) token. |
Specify http://www.ibm.com/websphere/appserver/tokentype as the URI value. | Specify LTPA_PROPAGATION as the local name value. | Specifies a binary security token that contains an embedded propagation token. |
namespace URI value as indicated by the provider. | Specify http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#UsernameToken as the local name value. | Timeoken type that is configured to perform
token validation. This local name is used to remap an incoming security token
to a different security token. You can use this local name value in a situation
that is similar to the following scenario:
A client sends a username token to the server. The custom token consumer on the server uses the security token service to authenticate the user name information. The username token is used to create a new token type such as a Security Assertion Markup Language (SAML) token. You can use the identity from the SAML token for authentication and authorization verification in WebSphere Application Server. |
If you want to specify another token, specify both the local name and the URI. For example, if you have an implementation of your own custom token, you can specify CustomToken in the Local name field and http://www.ibm.com/custom
To access the panel, click Security > Secure administrative, applications, and infrastructure. Under Authentication, click RMI/IIOP security > CSIv2 Outbound authentication. To set the com.ibm.CSIOutboundPropagationEnabled property, select Security attribute propagation. To modify this JAAS login configuration, see the JAAS - System logins panel.