Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Authenticate users > Use the JAAS programming model for web authentication > Develop custom login modules for a system login configuration for JAAS > Customize application login with JAAS > 4. Configure a server-side JAAS authentication and login configuration.


Customize a server-side Java Authentication and Authorization Service authentication and login configuration

WAS supports plugging in a custom Java Authentication and Authorization Service (JAAS) login module before or after the WAS system login module. However, WAS does not support the replacement of the WAS system login modules, which are used to create the WSCredential credential and WSPrincipal principal in the Subject. By using a custom login module, you can either make additional authentication decisions or add information to the Subject to make additional, potentially finer-grained, authorization decisions inside a Java EE application.

WAS enables you to propagate information downstream that is added to the Subject by a custom login module. See Security attribute propagation.

To determine which login configuration to use for plugging in your custom login modules, see the descriptions of the login configurations that are located in the System login configuration entry settings for JAAS.

WAS supports the modification of the system login configuration through the administrative console and by using the wsadmin scripting utility.

To configure the system login configuration using the console, click...

Under Java Authentication and Authorization Service, click System logins.


Procedure


What to do next

The application name and the HttpServletRequest object might be read by the custom login module to perform mapping functions. The error page of the form-based login might be modified by a custom login module. In addition to the JAAS framework, WAS supports the trust association interface (TAI).

Other credential types and information can be added to the caller Subject during the authentication process using a custom login module. The third-party credentials in the caller Subject are managed by WAS as part of the security context. The caller Subject is bound to the running thread during the request processing. When a web or an EJB module is configured to use the caller identity, the user identity is propagated to the downstream service in an EJB request. The WSCredential credential and any third-party credentials in the caller Subject are not propagated downstream. Instead, some of the information can be regenerated at the target server based on the propagated identity. Add third-party credentials to the caller Subject at the authentication stage. The caller Subject, which is returned from the WSSubject.getCallerSubject method, is read-only and cannot be modified. For more information on the WSSubject subject, see Get the caller subject from the thread for JAAS.


Related


Get the caller subject from the thread for JAAS
Get the RunAs subject from the thread for JAAS
Ovveride the RunAs subject on the thread for JAAS
Revoking users from a cache for JAAS
Security attribute propagation
Get the caller subject from the thread for JAAS


Related


System login configuration entry settings for JAAS

+

Search Tips   |   Advanced Search