Friday, February 17, 2012

Configure LTPA on WebSphere Application Server(WAS) using Tivoli Access Manager e-business (TAMeb)

Scope: Using this document you could configure Single Sign-on(SSO) between WebSphere Application Server(6.x) and Tivoli Access Manager e-Business (6.0) using LTPA(Lightweight Third Party Authentication) tokens, the document provides a practical approach with details steps on how to configure, I will update this document to include any special instructions for other versions.

Product and Versions:
* WebSphere Application Server(6.x)
* Tivoli Access Manager e-Business (6.0)
* AIX Platform.

Acronyms:
* WAS - WebSphere Application Server.
* TAMeb - Tivoli Access Manager e-Business.
* LDAP - Lightweight Directory Access Protocol.

Assumptions:

* TAMeb is installed and configured.
* TAMeb WebSeal is configured and running on AIX.
* WAS installed and configured on AIX.
* Security on WAS is enabled using TAMeb LDAP, Click here to learn more.

Step 1: Export the LTPA key from WAS Admin Console.

a) Access the WAS Admin Console -> Click Security -> Click Authentication Mechanisms and expiration

Note: Below screenshot shows the "Administrative Security" and "Application Security" is enabled.




b) Enter the LTPA password in the "Password" field ->; re-enter the password on "Confirm password" field ->; Enter the LTPA key file name in out example its "example.com.ltpa.key" -> Click on "Export Keys" button.

Note: The Password and Fully qualified key file name could be anything('somepassword' for our example), this password is used to read the LTPA key while enabling LTPA on the TAMeb junction, the exported LTPA key will be under the Deployment Manager profiles root.

EX: /opt/WebSphere/AppServer/profiles/Dmgr01/example.com.ltpa.key



Step 2: Copy the ltpa key file WAS Server to TAMeb WebSEAL server.

ex: /app/pdweb/ltpa/example.com.ltpa.key


Step 3: Create or Modify the TAMeb Virtualhost junction to enable LTPA authentication.

a) Connect to TAMeb Policy server.

$ pdadmin -a sec_master
Enter Password:
pdadmin sec_master>

b) Create a VirtualHost junction

server task [WebSEAL_Name] virtualhost create -t ssl -h [ServerName-IP] -p [PORT] -v [DomainName] -A -F [path_to_ltpa_key_file] -Z [password] -c iv-user [virtual_Host_Junction_Name]

Ex:
server task Webseal-Exampe virtualhost create -t ssl -h example-ihs-server.com -p 443 -v example.com -A -F /app/pdweb/ltpa/example.com.ltpa.key -Z somepassword -c iv-user example.com

Use the below command if you want to modify an existing virtualhost junction, notice the -f switch.

server task Webseal-Exampe virtualhost create -t ssl -h example-ihs-server.com -p 443 -v example.com -A -F /app/pdweb/ltpa/example.com.ltpa.key -Z somepassword -c iv-user -f example.com

Step 4: Exit from TAMeb Policy server and Test by accessing the TAMeb URL.

The WAS Application would get the username used to login into TAMeb as a iv-user header.







No comments:

Post a Comment