SlideShare a Scribd company logo
1 of 22
Download to read offline
“Secure Portal” or
WebSphere Portal – Security with Everything
Dave Hay
Portal Architect
IBM Software Services for Lotus
david_hay@uk.ibm.com

18 March 2010
Agenda

●   Definition of Terms
●   Moving away from the “Out Of The Box” experience
●   Federated Repositories
●   Custom User Registry
●   Authentication against a Corporate Directory
●   Authorisation and Personalisation via LDAP and Property Extension
    Database
●   Desktop Single Sign-On in a Microsoft environment
●   Back-end SSO – in an all-IBM world
●   Back-End SSO – Using a Reverse Web Proxy server
●   Back-end SSO – Asserting identity in an open world
●   Further Reading



                                  2
Portal Operational Model
(Production)

                                                                           Cluster
                                                                           Manager



                          Web     Delivery    Content
                         Server    Portal    Rendering




     Site      Load
    Visitor   Balancer                                   Content / Portal Content / Portal
                                                           Database         Database


                                  Delivery    Content
                          Web      Portal    Authoring
                         Server

                                  Cluster     Cluster




                                                                 User           User
                                                               Directory      Directory



                                   3
Definition of Terms
●   WebSphere Application Server (WAS)
●   WebSphere Portal (WP)
●   Authentication vs. Authorisation vs. Personalisation
●   Property Extension Database ( aka LookAside )
●   Virtual Member Manager (VMM)
●   WebSphere Identity Manager (WIM)
●   Custom User Registry (CUR)
●   Trust Association Interceptor (TAI)
●   Lightweight Third Party Authentication (LTPA)
●   Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO)
●   Security Assertion Markup Language (SAML)
●   Kerberos
●   Shibboleth




                                          4
Authentication etc.




      5
Moving away from the “Out Of The Box”
experience
●   Portal automatically secured against WAS via WIM File System
    Repository
●   Optional during WAS installation; default during WP installation
●   Provides basic identity, profile and user information
●   Simple to manage via WAS/WP user interface and Java/API
●   Unwieldy – all user/group management is only via WAS/WP, and not
    easily accessible to back-end systems without coding
●   Portal security cannot “reach out” to back-end resources e.g. no SSO




                                   6
Federated Repositories

●   WAS/WP 6.1 and beyond
●   Provides support for multiple user repositories, including WIM ( File
    System ), LDAP, databases etc.
●   Useful for multiple user communities and use cases e.g. intranet and
    internet and extranet
●   Fits well with virtualization e.g. Virtual Portal
●   Needs careful planning and consideration e.g. user/group filters,
    realms, Single Sign-On domains,unique user identities etc.




                                   7
Custom User Registry

●   An option for authentication where requirements dictate non-LDAP
    approach
●   Requires custom development
●   Good solution for certain use cases e.g. back-end application
    integration, delegation of user access and management to corporate
    systems
●   Examples of implementation include using mainframe-based application
    via CUR




                                 8
Authentication against a Corporate
Directory
●   Supported LDAPs
    Lotus Domino
    Microsoft Active Directory
    Tivoli Directory Server
    Novell eDirectory
    Sun ONE Directory Server
●   Supported vs. tested vs. unsupported
●   Read-only vs. Read/Write
●   Security Wizard
●   Alternative Security Tasks ( ConfigEngine )
●   Can be used stand-alone or as part of Federated Repository solution




                                  9
Authorisation and Personalization via
LDAP and Property Extension Database
●   Describe how LDAP groups and attributes can be used to provide
    authorisation and personalized access to portal resources
●   Authorisation and Personalization can be two sides of the same coin;
    both can be used to change the user experience based upon external
    attributes
●   Authorization – where can I go now I'm in the portal ?
●   Personalization – what can I see ?
●   Authorisation – typically related to security e.g. permissions, user
    groups, roles etc.
●   Personalization – typically related to attributes, events, user profile
    choices
●   Customization – typically user controlled rather than externally
    influenced



                                   10
Single Sign-On




     11
SSO Domain Concepts




                12
Desktop Single Sign-On in a Microsoft
environment
●   Provides seamless SSO to users once Windows login has completed
●   Requires Portal to use same Active Directory domain as user's
    Windows desktops
●   SPNEGO is used to negotiate the authentication protocol between
    client and server, using Kerberos
●   Works with Internet Explorer and Firefox
●   Active Directory and Kerberos ( Key Distribution Centre ) needs to be
    configured
●   WebSphere Trust Association Interceptor (TAI) provided in WAS 6.1
    and beyond
●   WAS needs to be configured
●   User browsers need to be configured
●   No longer requires front-end IIS server


                                   13
SPNEGO/Kerberos/AD implementation




                 14
Back-end SSO – in an all-IBM world
●   Appropriate for requirements where back-end applications support the
    IBM Lightweight Third Party Authentication (LTPA) mechanism
●   Examples include: -

    WebSphere Application Server
    WebSphere Portal
    Lotus Connections
    Lotus Domino
    Lotus Quickr
    Lotus Sametime
●   LTPA token generated by server following initial successful
    authentication; stored as cookie in browser
●   Used to provide authentication to trusted servers; those participating in
    the same SSO environment (DNS domain) and sharing a common
    LTPA private key ( encrypted )




                                    15
Back-End SSO – Using a Reverse Web
Proxy server
●   Examples are Tivoli Access Manager for e-Business (TAMeB) and Siteminder
●   IBM experiences tend towards TAMeB but Siteminder info is available
●   WebSEAL is the TAMeB web reverse proxy solution
●   WebSEAL intercepts all requests for secured, back-end web applications
●   Hides application URLs etc. from end-users increasing security
●   Authentication and authorisation ( to access web app. or not ) is made in
    WebSEAL
●   If auth/auth sucessful, WebSEAL passes request to WAS/Portal
●   TAI deployed in WAS to support this delegated authentication
●   Junctions ( transparent or otherwise ) created in WebSEAL for Portal
●   LTPA cookie is generated by WebSEAL junction and stored in user's browser,
    giving onwards SSO




                                       16
TAM-eB Reference Architecture




                  17
TAMeB implementation
                      1  An unauthenticated client issues a
                         request.
                      2 WebSEAL issues an HTTP authentication
                         challenge.
                      3 Client responds to challenge.
                      4 WebSEAL authenticated user against
                         user registry.
                      5 WebSEAL modifies the Header to include
                         (iv_creds, …)
                      6 Request to WAS where TAI performs
                         authentication of tai_user
                      7 User credentials are extracted from
                         header to construct a user principal.
                      8 WAS sends the request the Portal
                      9 Portal sends the Output to WebSEAL
                      10 WebSEAL dispatches the output to the
                         client.




                 18
Back-end SSO – Asserting identity in an
open world
●   Requirement where SSO is required from WebSphere to an external
    service
●   Can potentially be used in reverse using custom TAI – not supported by
    IBM
●   Necessary to “prove” that WebSphere user has been authenticated
●   Open-standard mechanism for the assertion of the user's identity, with
    implicit trust and security ( SAML )
●   SAML works by way of a paired set of servers – Identity Provider (IdP)
    and Service Provider (SP)
●   Various implements of SSO via SAML including Shibboleth and Tivoli
    Federated Identity Manager (TFIM)
●   Some entitlement to TFIM with WAS Network Deployment

    http://www-01.ibm.com/software/tivoli/products/federated-identity-mgr-websphere/index.html



                                               19
Shibboleth implementation
                       1)   The User attempts to access a Shibboleth-protected
                            resource on the Service Provider site.

                       2)   The User is redirected to the federation WAYF.

                       3)   The User select his or her home institution (*Identity
                            Provider) from the list presented by the WAYF.

                       4)   The Identity Provider, by whatever means it deems
                            appropriate, ensures that the User is authenticated.

                       5)   After successful authentication, a one-time Handle
                            (session identifier) is generated for this User session
                            and is sent to the Service Provider.

                       6)   The Service Provider uses the Handle to request
                            attribute information from the Identity Provider for this
                            User.

                       7)   The Identity Provider, on the basis of its Attribute
                            Release Policy, allows or denies attribute information
                            to be made available to this Service Provider.

                       8)   Based on the attribute information made available to
                            it, the Service Provider allows or refuses the User
                            access to the resource.




                  20
Further Reading
IBM WebSphere Application Server V6.1 Security Handbook

   http://www.redbooks.ibm.com/abstracts/sg246316.html?Open

IBM WebSphere Application Server V7.0 Security Guide

         http://www.redbooks.ibm.com/abstracts/sg247660.html

WebSphere Portal Family Wiki

         http://www-10.lotus.com/ldd/portalwiki.nsf

Tivoli Access Manager for e-Business

         http://www-01.ibm.com/software/tivoli/products/access-mgr-e-bus/

Tivoli Federated Identity Manager

   http://www.ibm.com/software/tivoli/products/federated-identity-mgr




                                                21
Any Questions ?




     22

More Related Content

What's hot

Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-onCA Technologies
 
vCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep divevCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep divefbuechsel
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahNSConclave
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementManish Harsh
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicHarihara sarma
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?rlsoft
 
Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Vladimir Dzhuvinov
 
4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010Fabrizio Volpe
 
Identity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethIdentity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethAndrew Petro
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11Niit Care
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing onguest648519
 
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLAlfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLJ V
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...Brian Culver
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancyDevam Shah
 

What's hot (20)

Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 
vCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep divevCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep dive
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren Shah
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
OpenSSO Tech Overview Aquarium
OpenSSO Tech Overview AquariumOpenSSO Tech Overview Aquarium
OpenSSO Tech Overview Aquarium
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?
 
Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0
 
WildFly & WildFly Swarm
WildFly & WildFly SwarmWildFly & WildFly Swarm
WildFly & WildFly Swarm
 
4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010
 
Identity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethIdentity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and Shibboleth
 
Java™ in Web 2.0
Java™ in Web 2.0Java™ in Web 2.0
Java™ in Web 2.0
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing on
 
Security Avalanche
Security AvalancheSecurity Avalanche
Security Avalanche
 
SINGLE SIGN-ON
SINGLE SIGN-ONSINGLE SIGN-ON
SINGLE SIGN-ON
 
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLAlfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
 
jboss.org-jboss.com
jboss.org-jboss.comjboss.org-jboss.com
jboss.org-jboss.com
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
 

Similar to “Secure Portal” or WebSphere Portal – Security with Everything

59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdfDeepakAC3
 
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise UsersApache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise UsersDataWorks Summit
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010Michael Noel
 
NIC - Windows Azure Pack - Level 300
NIC - Windows Azure Pack - Level 300NIC - Windows Azure Pack - Level 300
NIC - Windows Azure Pack - Level 300Kristian Nese
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonKi-Eun Shin
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectMichael J Geiser
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Michael Noel
 
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...Michael Collier
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?Tobias Koprowski
 
Oracle web center
Oracle web centerOracle web center
Oracle web centerEast Le
 
WebSphere Portal Technical Overview
WebSphere Portal Technical OverviewWebSphere Portal Technical Overview
WebSphere Portal Technical OverviewVincent Perrin
 
Integrated Services for Web Applications
Integrated Services for Web ApplicationsIntegrated Services for Web Applications
Integrated Services for Web ApplicationsSaltmarch Media
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016 ForgeRock
 
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1ukdpe
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2
 
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 Michael Noel
 
Skype for business mobility
Skype for business mobilitySkype for business mobility
Skype for business mobilityFabrizio Volpe
 
Api management update for optus
Api management update for optusApi management update for optus
Api management update for optussflynn073
 

Similar to “Secure Portal” or WebSphere Portal – Security with Everything (20)

59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
 
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise UsersApache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
 
NIC - Windows Azure Pack - Level 300
NIC - Windows Azure Pack - Level 300NIC - Windows Azure Pack - Level 300
NIC - Windows Azure Pack - Level 300
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG Hackathon
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS Project
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
 
Oracle web center
Oracle web centerOracle web center
Oracle web center
 
WebSphere Portal Technical Overview
WebSphere Portal Technical OverviewWebSphere Portal Technical Overview
WebSphere Portal Technical Overview
 
Integrated Services for Web Applications
Integrated Services for Web ApplicationsIntegrated Services for Web Applications
Integrated Services for Web Applications
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
 
Skype for business mobility
Skype for business mobilitySkype for business mobility
Skype for business mobility
 
Web servers
Web serversWeb servers
Web servers
 
Api management update for optus
Api management update for optusApi management update for optus
Api management update for optus
 

More from Dave Hay

Suppressing http headers from web sphere application server
Suppressing http headers from web sphere application serverSuppressing http headers from web sphere application server
Suppressing http headers from web sphere application serverDave Hay
 
Installing web sphere application server v7 on red hat enterprise linux v6.3
Installing web sphere application server v7 on red hat enterprise linux v6.3Installing web sphere application server v7 on red hat enterprise linux v6.3
Installing web sphere application server v7 on red hat enterprise linux v6.3Dave Hay
 
Dave hay web sphere administration for domino administrators
Dave hay   web sphere administration for domino administratorsDave hay   web sphere administration for domino administrators
Dave hay web sphere administration for domino administratorsDave Hay
 
Dave hay desktop single sign-on in an active directory world
Dave hay   desktop single sign-on in an active directory worldDave hay   desktop single sign-on in an active directory world
Dave hay desktop single sign-on in an active directory worldDave Hay
 
Dave hay desktop single sign-on in an active directory world
Dave hay   desktop single sign-on in an active directory worldDave hay   desktop single sign-on in an active directory world
Dave hay desktop single sign-on in an active directory worldDave Hay
 
Web sphere user group march 2012 - desktop single sign-on in an active dire...
Web sphere user group   march 2012 - desktop single sign-on in an active dire...Web sphere user group   march 2012 - desktop single sign-on in an active dire...
Web sphere user group march 2012 - desktop single sign-on in an active dire...Dave Hay
 
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...Dave Hay
 

More from Dave Hay (7)

Suppressing http headers from web sphere application server
Suppressing http headers from web sphere application serverSuppressing http headers from web sphere application server
Suppressing http headers from web sphere application server
 
Installing web sphere application server v7 on red hat enterprise linux v6.3
Installing web sphere application server v7 on red hat enterprise linux v6.3Installing web sphere application server v7 on red hat enterprise linux v6.3
Installing web sphere application server v7 on red hat enterprise linux v6.3
 
Dave hay web sphere administration for domino administrators
Dave hay   web sphere administration for domino administratorsDave hay   web sphere administration for domino administrators
Dave hay web sphere administration for domino administrators
 
Dave hay desktop single sign-on in an active directory world
Dave hay   desktop single sign-on in an active directory worldDave hay   desktop single sign-on in an active directory world
Dave hay desktop single sign-on in an active directory world
 
Dave hay desktop single sign-on in an active directory world
Dave hay   desktop single sign-on in an active directory worldDave hay   desktop single sign-on in an active directory world
Dave hay desktop single sign-on in an active directory world
 
Web sphere user group march 2012 - desktop single sign-on in an active dire...
Web sphere user group   march 2012 - desktop single sign-on in an active dire...Web sphere user group   march 2012 - desktop single sign-on in an active dire...
Web sphere user group march 2012 - desktop single sign-on in an active dire...
 
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
 

Recently uploaded

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 

“Secure Portal” or WebSphere Portal – Security with Everything

  • 1. “Secure Portal” or WebSphere Portal – Security with Everything Dave Hay Portal Architect IBM Software Services for Lotus david_hay@uk.ibm.com 18 March 2010
  • 2. Agenda ● Definition of Terms ● Moving away from the “Out Of The Box” experience ● Federated Repositories ● Custom User Registry ● Authentication against a Corporate Directory ● Authorisation and Personalisation via LDAP and Property Extension Database ● Desktop Single Sign-On in a Microsoft environment ● Back-end SSO – in an all-IBM world ● Back-End SSO – Using a Reverse Web Proxy server ● Back-end SSO – Asserting identity in an open world ● Further Reading 2
  • 3. Portal Operational Model (Production) Cluster Manager Web Delivery Content Server Portal Rendering Site Load Visitor Balancer Content / Portal Content / Portal Database Database Delivery Content Web Portal Authoring Server Cluster Cluster User User Directory Directory 3
  • 4. Definition of Terms ● WebSphere Application Server (WAS) ● WebSphere Portal (WP) ● Authentication vs. Authorisation vs. Personalisation ● Property Extension Database ( aka LookAside ) ● Virtual Member Manager (VMM) ● WebSphere Identity Manager (WIM) ● Custom User Registry (CUR) ● Trust Association Interceptor (TAI) ● Lightweight Third Party Authentication (LTPA) ● Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) ● Security Assertion Markup Language (SAML) ● Kerberos ● Shibboleth 4
  • 6. Moving away from the “Out Of The Box” experience ● Portal automatically secured against WAS via WIM File System Repository ● Optional during WAS installation; default during WP installation ● Provides basic identity, profile and user information ● Simple to manage via WAS/WP user interface and Java/API ● Unwieldy – all user/group management is only via WAS/WP, and not easily accessible to back-end systems without coding ● Portal security cannot “reach out” to back-end resources e.g. no SSO 6
  • 7. Federated Repositories ● WAS/WP 6.1 and beyond ● Provides support for multiple user repositories, including WIM ( File System ), LDAP, databases etc. ● Useful for multiple user communities and use cases e.g. intranet and internet and extranet ● Fits well with virtualization e.g. Virtual Portal ● Needs careful planning and consideration e.g. user/group filters, realms, Single Sign-On domains,unique user identities etc. 7
  • 8. Custom User Registry ● An option for authentication where requirements dictate non-LDAP approach ● Requires custom development ● Good solution for certain use cases e.g. back-end application integration, delegation of user access and management to corporate systems ● Examples of implementation include using mainframe-based application via CUR 8
  • 9. Authentication against a Corporate Directory ● Supported LDAPs Lotus Domino Microsoft Active Directory Tivoli Directory Server Novell eDirectory Sun ONE Directory Server ● Supported vs. tested vs. unsupported ● Read-only vs. Read/Write ● Security Wizard ● Alternative Security Tasks ( ConfigEngine ) ● Can be used stand-alone or as part of Federated Repository solution 9
  • 10. Authorisation and Personalization via LDAP and Property Extension Database ● Describe how LDAP groups and attributes can be used to provide authorisation and personalized access to portal resources ● Authorisation and Personalization can be two sides of the same coin; both can be used to change the user experience based upon external attributes ● Authorization – where can I go now I'm in the portal ? ● Personalization – what can I see ? ● Authorisation – typically related to security e.g. permissions, user groups, roles etc. ● Personalization – typically related to attributes, events, user profile choices ● Customization – typically user controlled rather than externally influenced 10
  • 13. Desktop Single Sign-On in a Microsoft environment ● Provides seamless SSO to users once Windows login has completed ● Requires Portal to use same Active Directory domain as user's Windows desktops ● SPNEGO is used to negotiate the authentication protocol between client and server, using Kerberos ● Works with Internet Explorer and Firefox ● Active Directory and Kerberos ( Key Distribution Centre ) needs to be configured ● WebSphere Trust Association Interceptor (TAI) provided in WAS 6.1 and beyond ● WAS needs to be configured ● User browsers need to be configured ● No longer requires front-end IIS server 13
  • 15. Back-end SSO – in an all-IBM world ● Appropriate for requirements where back-end applications support the IBM Lightweight Third Party Authentication (LTPA) mechanism ● Examples include: - WebSphere Application Server WebSphere Portal Lotus Connections Lotus Domino Lotus Quickr Lotus Sametime ● LTPA token generated by server following initial successful authentication; stored as cookie in browser ● Used to provide authentication to trusted servers; those participating in the same SSO environment (DNS domain) and sharing a common LTPA private key ( encrypted ) 15
  • 16. Back-End SSO – Using a Reverse Web Proxy server ● Examples are Tivoli Access Manager for e-Business (TAMeB) and Siteminder ● IBM experiences tend towards TAMeB but Siteminder info is available ● WebSEAL is the TAMeB web reverse proxy solution ● WebSEAL intercepts all requests for secured, back-end web applications ● Hides application URLs etc. from end-users increasing security ● Authentication and authorisation ( to access web app. or not ) is made in WebSEAL ● If auth/auth sucessful, WebSEAL passes request to WAS/Portal ● TAI deployed in WAS to support this delegated authentication ● Junctions ( transparent or otherwise ) created in WebSEAL for Portal ● LTPA cookie is generated by WebSEAL junction and stored in user's browser, giving onwards SSO 16
  • 18. TAMeB implementation 1 An unauthenticated client issues a request. 2 WebSEAL issues an HTTP authentication challenge. 3 Client responds to challenge. 4 WebSEAL authenticated user against user registry. 5 WebSEAL modifies the Header to include (iv_creds, …) 6 Request to WAS where TAI performs authentication of tai_user 7 User credentials are extracted from header to construct a user principal. 8 WAS sends the request the Portal 9 Portal sends the Output to WebSEAL 10 WebSEAL dispatches the output to the client. 18
  • 19. Back-end SSO – Asserting identity in an open world ● Requirement where SSO is required from WebSphere to an external service ● Can potentially be used in reverse using custom TAI – not supported by IBM ● Necessary to “prove” that WebSphere user has been authenticated ● Open-standard mechanism for the assertion of the user's identity, with implicit trust and security ( SAML ) ● SAML works by way of a paired set of servers – Identity Provider (IdP) and Service Provider (SP) ● Various implements of SSO via SAML including Shibboleth and Tivoli Federated Identity Manager (TFIM) ● Some entitlement to TFIM with WAS Network Deployment http://www-01.ibm.com/software/tivoli/products/federated-identity-mgr-websphere/index.html 19
  • 20. Shibboleth implementation 1) The User attempts to access a Shibboleth-protected resource on the Service Provider site. 2) The User is redirected to the federation WAYF. 3) The User select his or her home institution (*Identity Provider) from the list presented by the WAYF. 4) The Identity Provider, by whatever means it deems appropriate, ensures that the User is authenticated. 5) After successful authentication, a one-time Handle (session identifier) is generated for this User session and is sent to the Service Provider. 6) The Service Provider uses the Handle to request attribute information from the Identity Provider for this User. 7) The Identity Provider, on the basis of its Attribute Release Policy, allows or denies attribute information to be made available to this Service Provider. 8) Based on the attribute information made available to it, the Service Provider allows or refuses the User access to the resource. 20
  • 21. Further Reading IBM WebSphere Application Server V6.1 Security Handbook http://www.redbooks.ibm.com/abstracts/sg246316.html?Open IBM WebSphere Application Server V7.0 Security Guide http://www.redbooks.ibm.com/abstracts/sg247660.html WebSphere Portal Family Wiki http://www-10.lotus.com/ldd/portalwiki.nsf Tivoli Access Manager for e-Business http://www-01.ibm.com/software/tivoli/products/access-mgr-e-bus/ Tivoli Federated Identity Manager http://www.ibm.com/software/tivoli/products/federated-identity-mgr 21