ID304  Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What you NEED to know! Jay Boyd  | Lotus Connections Team Lead | IBM Luis Benitez  | Social Software Product Manager | IBM
Who we are
Tweet Away
Agenda Options for Securing Lotus Connections
SSO
New User Life Cycle Options in 3.0
Q&A
Not ideal security... Photo credit:  http://www.flickr.com/photos/fboyd/2494909325/
Securing Lotus Connections Lotus Connections has tons of security options Virus Scanning
SSL (even forced!)
Forced Authentication
Filtering active content
MIME control
and... Photo credit: http://www.flickr.com/photos/juanpol/2704542/
Agenda Options for Securing Lotus Connections
SSO
New User Life Cycle Options in 3.0
Q&A
Single Sign On My favorite
Improves usability
Great for adoption Photo credit: http://commons.wikimedia.org/wiki/File:Single_sign_on_aproaches.png
What's supported SSO  … with Domino apps (of course!)
… with WebSphere apps (any doubt?)
… with Quickr J/D (go go Gadget docs)
… with Sametime (duh!)
… via Tivoli Access Manager 6.1.1
… via CA's Siteminder 6.0
… via SPNEGO Portlets are an exception :(
Single Sign On: Connections 3.0 Options SSO allows a user to authenticate once and then use other systems that are within the same authentication configuration without providing userid/password authentication subsequent times.
LTPA (WebSphere default)
SPNEGO
TAM (Form Based Auth, Transparent Junctions, LTPA)
SiteMinder (FBA, ASA/WebAgent)
TAM/SPNEGO
Except with LTPA, authentication is forced, there is no anonymous access
Cookies are key with most SSO options (these are not your mother's Cookies) Cookies Textual information consisting of Name/Value pairs
Usually used to provide State in an otherwise Stateless protocol (HTTP)
Domain and Path determine when Cookies are included with an HTTP Request SPNEGO uses Security tokens in the HTTP Header with every request
Single Sign On: LTPA Lightweight Third-Party Authentication IBM proprietary, supported by IBM products such as WebSphere and Domino
Represented as Cookies called LtpaToken (older format, not on by default in WAS7, Domino requires version1) or LtpaToken2, value is encrypted UserID
Authentication Realm
Authentication Expiration Time Important to use both of these if integrating with Domino and Portal
Single Sign On: Keys to successful LTPA Configuration All participating Servers: Same Authentication Realm (correlates to Cookie domain)
Synchronized system time
Identical LDAP configuration (WAS Federated Repository)
Share the same LTPA keys

ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What you NEED to know!

Editor's Notes

  • #7 Lotus Connections supports the Internet Content Adaptation Protocol (ICAP) and its applications use this protocol to communicate with virus detection products. Ensure that the virus detection product used in your enterprise supports the ICAP 1.0 protocol. Lotus Connections is certified to work with Symantec AntiVirus Scan Engine 5.1 and McAfee web Security Appliance (3400) and (3300). Lotus® Connections provides security measures, such as an active content filter and content upload limits, that you can use to mitigate the risk of malicious attacks. Because these security measures can also limit the flexibility of the applications, you, as the system administrator, must evaluate the security of your network and determine whether or not you need to implement them. Any software that displays user authored content can be vulnerable to cross-site scripting (XSS) attacks. Attackers can introduce JavaScript™ into their content that can, among other things, steal a user's session. Session stealing in a single sign-on (SSO) environment poses particular challenges because any vulnerability to XSS attacks can render the entire single sign-on domain vulnerable.
  • #10 SPNEGO = Simple and Protected Negotiation Portlets don't support SSO via TAM/Siteminder/SPNEGO – they require LTPA
  • #21 Import the LTPA key and password from TAM and Import into WebSphere and set the SSO domain name Do not use TAM components as a caching proxy, configuration complexity is very high Lotus Connections only supports WebSeal Transparent Junction configuration Configure TAM for URL rewriting in XML and Javascript content TAM configuration setting 'use-same-session = yes' is required
  • #37 A TDI assembly line is made up of components (connectors, flow controls, loops, branches) that collect data from your source repositories and reformat it into the Profiles database. Supports two-way synchronization on LDAP attributes. Assembly line hooks are available for scripting and customization TDI should be used to initially populate Profiles and then frequently used to keep it in sync Connections release 3 allows you to mark a person as “inactive” when they aren't found in LDAP
  • #40 SyncAllMembersByExtId() takes several parameters indicating how a mismatch can be resolved (either by a matching email address, login id or left for later manual resolution).
  • #43 Use Batch commands, external ids are consistent across all applications. Investigate once, create batch script to update across all apps Returning users can be re-linked with their old data ProfilesService.swapUserAccessByUserId("oldUserId","newUserId")