Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Authenticate users


Propagate security attributes among application servers

Use the security attribute propagation feature of WAS to send security attribute information regarding the original login to other servers using a token. This topic will help to configure WAS to propagate security attributes to other servers.

To fully enable security attribute propagation, configure the single sign-on (SSO), Common Secure Interoperability Version 2 (CSIv2) inbound, and CSIv2 outbound panels in the WAS administrative console. We can enable just the portions of security attribute propagation relevant to the configuration. For example, you can enable web propagation, which is propagation amongst front-end application servers, using either the push technique (DynaCache) or the pull technique (remote method to originating server).

You also can choose whether to enable RMI outbound and inbound propagation, which is commonly called downstream propagation. Typically both types of propagation are enabled for any given cell. In some cases, you might want to choose a different option for a specific application server using the server security panel within the specific application server settings.

Restriction: To prevent propagating the same security attributes among application servers multiple times, WAS verifies that a Lightweight Third Party Authentication (LTPA) token does not exist. Two cases can occur. Absence of the LTPA token tells the Application Server that propagation can proceed. Presence of the LTPA token indicates that propagation has occurred if the LTPA token has been generated within the cluster. However, in the second case, if the LTPA token is present, but has been generated by a server outside the cluster, such as by Tivoli Access Manager, Lotus Domino or a different Application Server cluster, security attributes are not propagated.

To access the server security panel in the admin console, click Servers > Application Servers > server_name

. Under Security, click Server security.

Complete the following steps to configure WAS for security attribute propagation:


Procedure

  1. Access the WAS admin console by typing http://server_name

    port_number/ibm/console. The admin console address might differ if we have previously changed the port number.

  2. Click Security > Global security.

  3. Under Web security, click Single sign-on (SSO).

  4. Optional: Select the Interoperability Mode option if interoperate with servers that do not support security attribute propagation. Servers that do not support security attribute propagation receive the Lightweight Third Party Authentication (LTPA) token and the Propagation token, but ignore the security attribute information that they do not understand.

  5. Select the Web inbound security attribute propagation option. The Web inbound security attribute propagation option enables horizontal propagation, which allows the receiving SSO token to retrieve the login information from the original login server. If you do not enable this option, downstream propagation can occur if you enable the Security Attribute Propagation option on both the CSIv2 Inbound authentication and CSIv2 outbound authentication panels.

    Typically, you enable the web inbound security attribute propagation option if you need to gather dynamic security attributes set at the original login server that cannot be regenerated at the new front-end server. These attributes include any custom attributes that might be set in the PropagationToken token using the com.ibm.websphere.security.WSSecurityHelper API. We must determine whether enabling this option improves or degrades the performance of your system. While the option prevents some remote user registry calls, the deserialization and decryption of some tokens might impact performance. In some cases propagation is faster, especially if your user registry is the bottleneck of your topology. IBM recommends that you measure the performance of the environment both using and not using this option. When you test the performance, IBM recommends that you test in the operating environment of the typical production environment with the typical number of unique users accessing the system simultaneously.

  6. Click Security > Global security. Under RMI/IIOP security, click CSIv2 inbound authentication. The Login configuration field specifies RMI_INBOUND as the system login configuration used for inbound requests.

    To add custom JAAS (JAAS) login modules...

    1. Click Security > Global security. Under JAAS, click System logins. A list of the system login configurations is displayed. WAS provides the following pre-configured system login configurations: DEFAULT, LTPA, LTPA_WEB, RMI_INBOUND, RMI_OUTBOUND, SWAM, WEB_INBOUND, wssecurity.IDAssertion, and wssecurity.Signature. Do not delete these predefined configurations.

      SWAM is deprecated in WAS v8.0 and will be removed in a future release.

    2. Click the name of the login configuration that you want to modify.

    3. Under Additional Properties, click JAAS Login Modules. The JAAS Login Modules panel is displayed, which lists all of the login modules that are processed in the login configuration. Do not delete the required JAAS login modules. Instead, you can add custom login modules before or after the required login modules. If you add custom login modules, do not begin their names with com.ibm.ws.security.server.

      You can specify the order in which the login modules are processed by clicking Set Order.

  7. Select the Security attribute propagation option on the CSIv2 inbound authentication panel. When you select Security Attribute Propagation, the server advertises to other application servers that it can receive propagated security attributes from another server in the same realm over the Common Secure Interoperability version 2 (CSIv2) protocol.

  8. Click Security > Global security. Under RMI/IIOP security, click CSIv2 Outbound authentication. The CSIv2 outbound authentication panel is displayed. The Login configuration field specifies RMI_OUTBOUND as the JAAS login configuration that is used for outbound configuration. We cannot change this login configuration. Instead, you can customize this login configuration by completing the substeps that are listed previously for CSIv2 Inbound authentication.

  9. Optional: Verify that the Security Attribute Propagation option is selected to enable outbound Subject and security context token propagation for the Remote Method Invocation (RMI) protocol. When you select this option, WAS serializes the Subject contents and the PropagationToken contents. After the contents are serialized, the server uses the CSIv2 protocol to send the Subject and PropagationToken token to the target servers that support security attribute propagation. If the receiving server does not support security attribute tokens, WAS sends the Lightweight Third Party Authentication (LTPA) token only.

    WAS propagates only the objects within the Subject that it can serialize. The server propagates custom objects on a best-effort basis.

    When Security Attribute Propagation is enabled, WAS adds marker tokens to the Subject to enable the target server to add additional attributes during the inbound login. During the commit phase of the login, the marker tokens and the Subject are marked as read-only and cannot be modified thereafter.

  10. Optional: Select the Custom Outbound Mapping option if you clear the Security Attribute Propagation option and to use the RMI_OUTBOUND login configuration. If neither the Custom Outbound Mapping option nor the Security Attribute Propagation option is selected, WAS does not call the RMI_OUTBOUND login configuration. If you need to plug in a credential mapping login module, select the Custom Outbound Mapping option.

  11. Optional: Specify trusted target realm names in the Trusted Target Realms field. By specifying these realm names, information can be sent to servers that reside outside the realm of the sending server to support inbound mapping that is at these downstream servers.

    To perform outbound mapping to a realm different from the current realm, specify the realm in this field so that you can get to this point without having the request rejected because of a realm mismatch. If you need WAS to propagate security attributes to another realm when a request is sent, specify the realm name in the Trusted Target Realms field. Otherwise, the security attributes are not propagated to the unspecified realm. We can add multiple target realms by adding a pipe (|) delimiter between each entry.

  12. Optional: Enable propagation for a pure client. For a pure client to propagate attributes added to the invocation Subject, add the following property to the sas.client.props file:
    com.ibm.CSI.rmiOutboundPropagationEnabled=true
    

    The sas.client.props file is located at <WAS-HOME>/profiles/ <ProfileName>/properties>.


Results

After completing these steps, we have configured WAS to propagate security attributes to other servers.


What to do next

If you need to disable security attribute propagation, determine whether disable it for either the server level or the cell level.

Attention: Changes to the server-level settings override the cell settings.

To disable security attribute propagation on the server level, complete the following steps:

  1. Click Server > Application Servers > server_name

    .

  2. Under Security, click Server security.

  3. Select the RMI/IIOP security for this server overrides cell settings option.
  4. Disable security attribute propagation for inbound requests by clicking CSI inbound authentication under Additional Properties and clearing the Security attribute propagation option.
  5. Disable security attribute propagation for outbound requests by clicking CSI outbound authentication under Additional Properties and clearing the Security attribute propagation option.

To disable security attribute propagation on the cell level, undo each of the steps that you completed to enable security attribute propagation in this task.


Related


Use the default authorization token to propagate security attributes
Use the default propagation token to propagate security attributes
Use the default single sign-on token with default or custom token factory to propagate security attributes
Security attribute propagation
Use the default propagation token to propagate security attributes
Use the default authorization token to propagate security attributes
Use the default single sign-on token with default or custom token factory to propagate security attributes
Implement a custom propagation token for security attribute propagation
Implement a custom authorization token for security attribute propagation
Implement a custom single sign-on token for security attribute propagation
Implement a custom authentication token for security attribute propagation
Propagate a custom Java serializable object for security attribute propagation
Authenticate users


Related


Default authentication token

+

Search Tips   |   Advanced Search