+

Search Tips   |   Advanced Search

Staging and external security managers

The following section discusses considerations of the impact of external security managers (ESMs) on the staging process. External security managers can be used to externalize authentication and authorization decisions from the portal. Externalization of authentication decisions to an external security manager has no impact on the staging to production functionality. Externalization of authorization decisions does have an impact. Using an ESM for authorization decisions requires the same ESM is used to manage authentication to the portal.

Use the security manager to manage entities the centralized security manager controls. Managing those entities elsewhere violates the principles of centralized security control. This principle does not change in staging-to-production support. For staging-to-production, this principle leads to the inability to modify security definitions of a resource that is externalized. The following sections describe the direct implications in ESM scenarios for staging-to-production.

xmlaccess.sh is used for configuration management in the staging-to-production support. xmlaccess.sh covers configurations managed by the portal. The XML configuration interface configuration files contain a list of all role mappings for all internally managed resources. Using ESMs allows management of entitlements for selected resources outside of the portal.

For IBM WebSphere Portal, the XML configuration interface covers security definitions of externalized resources. We can provide a request parameter within an export request through this functionality for xmlaccess.sh. This parameter causes xmlaccess.sh to include role mappings of all resources in the output file. The exported file contains role mappings for internally managed resources and externally managed resources. This feature allows for the staging of role mapping of all resources not already externalized in the target system.

The following support matrix illustrates staging support of entitlements in scenarios that involve ESM. The source system refers to the system from which the configuration is exported (typically the integration system). The target system is the system into which the configuration is going to be imported (for example, staging or production system).


no-ESM Target ESM Target
no-ESM Source All role mappings can be fully synchronized. Resources on the target system are initially managed internally after release staging. Resources can be externalized on the target system. Role mappings of externally managed resources in the target system are reinternalized.
ESM Source Role mappings of internalized resources can be synchronized. Synchronization of role mappings of externalized resources results in errors during import. (Manual configuration file updates ("change external to internal state") are required to prevent errors.)

Role mappings of internalized resources are fully synchronized.

Role mappings of externalized resources can be synchronized only on time of externalization.

Role mappings for resources externalized on the target system cannot be synchronized.

In summary, role mappings can be synchronized when the resource is managed internally by the WebSphere Portal server. When the resource is externalized, role mappings are owned by the ESM system and cannot be synchronized.

However, it is not possible to modify role mappings for existing externalized resources and synchronize their updated role mappings to a target system.


Stage from system without ESM to a system with ESM

This combination is used where the integration system is reduced as much as possible and is configured like a development environment rather than a production environment.

Entitlements for resources staged in this scenario are fully synchronized. All resources in the target system are managed internally. The ESM is not used for managing authorization decisions.

We can manually externalize resources. We can also manually edit XML configuration interface configuration files. In this step, all role mappings that were defined within the portal before are moved to the ESM. Managing these resources externally might include updating the role mappings of these resources outside the portal.

During staging of subsequent releases, resources with updated entitlements appear in xmlaccess.sh file as internally managed resources. These resources are internalized when this file is imported to the target system. We can manually update the configurations for externally managed resources to prevent this action. However, there is no build-in support for managing these kinds of configurations. Special care must be taken to manually replicate all changes of role mappings of externalized resources on the target system.


Stage from system with ESM to system without ESM

In this scenario, entitlements for internalized resources can be staged without any limitations. These configurations appear as if the source system was not configured to use an ESM.

If entitlements for resources externalized on the source system are staged, errors occur on the target system. During import of this configuration, the target system is asked to externalize a resource. The system is not configured to support resource externalization. This option results in an error condition.

These errors can be resolved by manually updating the configuration file to have all resources managed internally. If role mappings for externalized resources are contained in the configuration file, entitlements are synchronized between the two systems.


Parent Staging to production