Skip Headers

Oracle HTTP Server Administrator's Guide
10g (9.0.4)

Part Number B10381-01
Go To Documentation Library
Home
Go To Product List
Solution Area
Go To Table Of Contents
Contents
Go To Index
Index

Go to previous page Go to next page

B
Using Oracle Application Server SSO Plug-in

This appendix explains how to use Oracle Application Server SSO Plug-in to protect third-party HTTP listener and its applications. The Oracle Application Server SSO Plug-in works with the Sun ONE Web Server Enterprise Edition, version 4.1 and 6.0, on UNIX and Windows NT systems, and the Microsoft Internet Information Server (IIS), version 4.0 or 5.0, on Windows systems.

Topics discussed are:

Overview

Oracle Application Server SSO Plug-in is Oracle's single sign-on (SSO) solution for third-party listeners such as Sun ONE and IIS. The plug-in is designed to protect native third-party listener applications using the SSO infrastructure. With the help of the Oracle Application Server SSO Plug-in, you can be authenticated to different third-party listener applications using only one SSO password. You can integrate these SSO-protected third-party listener applications with SSO enabled Oracle HTTP Server applications or legacy Oracle SSO enabled application together as long as they are all protected on the same SSO server.

Oracle Application Server SSO Plug-in is a simple version of mod_osso, and only implements some of its basic functionality. Features such as dynamic authentication, global logout, idle timeout and global timeout, and basic authentication for legacy application are not implemented in the current Oracle Application Server SSO Plug-in release.

Figure B-1 illustrates the process involved when you request a URL protected by the Oracle Application Server SSO Plug-in.

Figure B-1 Oracle Application Server SSO Plug-in

Text description of ssoplug.gif follows.

Text description of the illustration ssoplug.gif

  1. The user requests a URL through a Web browser.

  2. The Web server looks for an Oracle Application Server SSO Plug-in cookie for the user. If the cookie exists, the Web server extracts the user's information and uses it to log the user in to the requested application.

  3. If the cookie does not exist, then the Oracle Application Server SSO Plug-in redirects the user to the single sign-on server.

  4. The single sign-on server looks for its own cookie in the browser. If it finds none, it tries to authenticate the user with a user name and password. If authentication is successful, the single sign-on server creates a cookie in the browser as a reminder that the user has been authenticated. If a cookie exists, the single sign-on server authenticates using the cookie.

  5. The single sign-on server returns the user's encrypted information to the Oracle Application Server SSO Plug-in.

  6. Oracle Application Server SSO Plug-in creates its own cookie for the user in the browser and redirects the user to the requested URL.

    During the same session, if the user again seeks access to the same or to a different application, the user is not prompted for a user name and password; the application uses an HTTP header to obtain this information from the Oracle Application Server SSO Plug-in session cookie.

Downloading SSO Plug-in

The plug-in is distributed on the OracleAS Repository Creation Assistant/Utilities CD, which is included in your Oracle Application Server CD Pack.

Installing SSO Plug-in

Install Oracle Application Server SSO Plug-in on a machine that has an Oracle Application Server installation. This installation is required only for the network and security dependent libraries and single sign-on registration tool; it is not required to be running. After the Oracle Application Server installation on UNIX systems, add ORACLE_HOME/lib to the LD_LIBRARY_PATH in the listener's start script. For example, the "start" script in Sun ONE. On Windows systems, the installation automatically sets the environment variable PATH. For example, ORACLE_HOME\bin.

Download, or copy, the required plug-in, and place the configuration file and shared libraries in directories that the third-party listener can access. For security reasons, ensure that all the configuration files and plug-in modules are given minimum privileges.

Installing SSO Plug-in for Sun ONE

The plug-in consists of a single shared library, oracle_proxy.so on UNIX and oracle_proxy_nes.dll on Windows. To install the plug-in into the listener, place the library in a directory to which the listener has read and execute privileges.

Installing SSO Plug-in for IIS

The plug-in consists of a single .dll, oracle_proxy.dll. To install this plug-in, copy the .dll to a directory the listener can access.

Registering with Single Sign-On

The single sign-on registration process enables the single sign-on server and the listener to share information such as server location, protocol version, and common encryption key, before they communicate. After the registration process, this information is stored on the single sign-on server side as a single sign-on partner application entry. On the listener side, a single sign-on file called sso_conf is created. sso_conf is obfuscated for security purposes. Copy it to an appropriate location so that the listener can access it.

Oracle provides a Java-based single sign-on registration tool to automatically complete this process.

Using the Single Sign-On Registration Tool

Register the third-party listener with a single sign-on server using the following command:

ORACLE_HOME/jdk/bin/java -jar ORACLE_HOME/sso/lib/ossoreg.jar [arguments]

where ORACLE_HOME is the home directory of your Oracle Application Server installation.


Note:

You can only run this tool on the same machine where your listener resides. Also, the resulting single sign-on configuration file has to be generated directly on the same machine. Do not copy the single sign-on configuration file across different machines.


A different version ossoreg.jar could have very different command arguments. If needed, run the above command using "-help" first to get the complete usage information.

Common Single Sign-On Registrar Command Arguments

Table B-1 lists some important common arguments for the single sign-on registrar.

Table B-1 SSO Registrar Command Arguments  
Argument Description

-oracle_home_path

Absolute path to the Oracle home of the Oracle Application Server installation

-site_name

Name of the site, typically expressed as the contiguous string host:port.

-ssoDBConnect

Single sign-on database JDBC connect string. It is optional. The default is obtained from the system.

-pass

ORASSO_PA password. It is optional. The default is obtained from the system.

-mod_osso_url

http://<listener_hostname.domain>:port

-admin_id

User name of the third-party administrator. This argument is optional.

-admin_info

Information associated with the administrator's user name, such as e-mail address. This argument is optional.

-config_ mod_osso

Set to TRUE. This parameter indicates that the application being registered is mod_osso. This argument is necessary to generate the sso_conf file.

-u

Specifies the name of the account used to start the third-party listener. For example, use the value of User specified in the magnus.conf for Sun ONE and SYSTEM for IIS. The default is the user who runs the single sign-on registrar tool.

-sso_server_version

Must be set to v1.2.

-virtualhost

Be sure to include this argument.

-config_file

Specifies a path of the final obfuscated single sign-on configuration file. Default is set to:

  • UNIX: ORACLE_HOME/Apache/Apache/conf/osso.conf

  • Windows: ORACLE_HOME/Apache\Apache\conf\osso.conf

Example B-1 Using Common Single Sign-On Registrar Command Arguments

On UNIX:

ORACLE_HOME/jdk/bin/java -jar ORACLE_HOME/sso/lib/ossoreg.jar \
-ssoDBConnect <host.domain>:1521:iasdb -pass your_password \
-oracle_home_path ORACLE_HOME -site_name <host.domain>:7778 \
-config_mod_osso TRUE -mod_osso_url http://<host.domain>:7778 \
-u nobody -admin_id admin_name -admin_info admin@company.com \
-sso_partner_version v1.2 \
-virtualhost \
-config_file ORACLE_HOME/Apache/Apache/conf/osso/sso_conf 

On Windows NT:

ORACLE_HOME/jdk/bin/java -jar ORACLE_HOME/sso/lib/ossoreg.jar \
-ssoDBConnect <host.domain>:1521:iasdb -pass your_password \
-oracle_home_path ORACLE_HOME -site_name <host.domain>:8080 \
-config_mod_osso TRUE -mod_osso_url http://<host.domain>:8080 \
-u SYSTEM -admin_id admin_name -admin_info admin@company.com \
-sso_partner_version v1.2 \
-virtualhost \
-config_file ORACLE_HOME/Apache/Apache/conf/osso/sso_conf 

Configuring SSO Plug-in

Create a plug-in configuration file such as osso_plugin.conf. This is the file where you define all the plug-in functionality. It can also be referred as the osso property file. The syntax is exactly the same for all third-party listeners. This file must reside in a directory that is readable by the third-party listener. This file also contains the following:

SSO Plug-in Configuration Directives

Table B-2 lists the configuration directives for the SSO plug-in:

Table B-2 SSO Plug-in Configuration Directives  
Directive Name Function

LoginServerFile

Specifies the location of the Single Sign-On Server configuration file such as sso.conf that is attained from the SSO registration process. This directive gets its name from Login Server, which is now called Single Sign-On Server, for historical reasons.

This is a global parameter and should not be used on a per-resource basis. That is, you must provide one and only one Single Sign-On Server configuration file.

  • Parameter Type: string

  • Allowable Values: the full path of your Single Sign-On Server configuration file, such as sso_conf.

  • Default Value: None. You must provide the exact location of the Single Sign-On server configuration file to allow SSO plug-in to be functional.

  • Example: LoginServerFile=/path/config/sso_conf

IpCheck

Specifies whether the SSO plug-in should check the IP address of each request when it examines the cookie. Valid values are true and false. Setting IpCheck to true prevents cookies being stolen.

  • Parameter Type: Boolean

  • Allowable Values: true/false.

  • Default Value: false.

  • Example: IpCheck=true

    Note: Set IpCheck to false if you have a proxy server or firewall between your Sun ONE server and your clients' browser.

HardTimeout

Deprecated.

Resource Protection

Use the following format to protect resources:

<OSSO url-matching-rule>
  SSO_configuration_directives
</OSSO>

Use the following rules to define the url-matching-rule:

Rule Name Description

Exact Match

This option identifies an exact file as a protected resource, for example: /examples/Hello.html

Context Match

This option identifies a directory as a protected resource, for example: /examples/*

Extension Match

This option identifies files with a certain extension in a particular directory as a protected resource, for example: /examples/*.jsp

When multiple rules apply to the same URL, the following precedence applies:

  1. Exact matches

  2. Longest context match plus suffix match

  3. Longest context match

Some examples of the precedence are:

/foo/bar/index.html would take precedence over /foo/bar/* 
/foo/bar/*.jsp would take precedence over /foo/bar/* 
/foo/bar/* would take precedence over /foo/*



Example B-2 Simple Single Sign-on Configuration File, osso_plugin.conf

LoginServerFile=/path/sso_conf <OSSO /private/hello.html> IpCheck = false </OSSO> <OSSO /private1/*> </OSSO> <OSSO /private2/*.jsp> IpCheck = true </OSSO>

Configuring Sun ONE Listener for Single Sign-on

This section provides SSO plug-in configuration instructions for the Sun ONE Enterprise Server listener on UNIX and Windows NT systems.


Note:

If you are configuring the Sun ONE listener on Windows NT, use forward slashes (/) in all paths.


  1. Open the magnus.conf file, version 6, or obj.conf, version 4, in the Sun ONE listener /config directory.

  2. Add the load-modules line:

    On UNIX:

    Init fn="load-modules" shlib="/path/oracle_proxy.so" funcs=osso_
    init,oracle_single_sign_on,osso_redirect_service,osso_success_service"
    
    

    On Windows NT:

    Init fn="load-modules" shlib="/path/oracle_proxy_nes.dll" funcs=osso_
    init,oracle_single_sign_on,osso_redirect_service,osso_success_service"
    
    

    where /path/ is the path to the shared library for the plug-in. This line tells the listener where the proxy shared library is, and which functions are exposed by this library.

  3. Add the configuration parameters line:

        Init fn="osso_init" osso_properties="/path/osso_plugin.conf" log_
        file="/path/plugin.log" log_level=error
    
    
    
    

    where /path/osso_plugin.conf is the exact location of the plug-in configuration file you just created. Also this line can specify a log file and log level to log messages from the plug-in (optional).

  4. Add the following line to the <Object name=default> section of the obj.conf file, before all other lines:

    AuthTrans fn="oracle_single_sign_on"
    
    
  5. Add the following line to the <Object name=default> section before all other lines that begin with the word Service:

    Service type="oracle/sso_redirect" fn="osso_redirect_service"
    
    
  6. Add the following lines where /path/ is the path of your document root. For example: /home/Sun ONE/docs/ or $docroot.

    <Object ppath="/path/osso_login_success">
      Service fn="osso_success_service"
    </Object>
    
    
  7. Change the LD_LIBRARY_PATH variable in your start script to include the location of ORACLE_HOME/lib, where ORACLE_HOME is the Oracle Application Server installation home directory.

  8. Restart the listener.

Usage Notes for Sun ONE Enterprise Server Version 6.0

For version 6.0, the same shared library can be used as with version 4.1. The configuration is virtually the same, but the configuration files for Sun ONE have changed slightly in version 6.0. In this version, the two lines beginning with Init that need to be added must be added at the end of the magnus.conf file rather than to the obj.conf file. The other two lines that should be added to obj.conf remain the same.

Configuring IIS Listener for Single Sign-On

This section provides instructions on configuring the IIS Listener to use the SSO plug-in. The plug-in consists of a single .dll, oracle_osso.dll. To install the plug-in, copy the .dll to the host on which IIS resides and perform the following steps:

  1. Edit your registry to create a new registry key named HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\IIS OSSO Adapter.

  2. Specify the exact location of your plug-in configuration file you just created. For example: d:\osso\osso_plugin.conf, by adding this string value with the name cfg_file and a value pointing to the location of your configuration file.

  3. Specify a log_file and log_level. This is optional.

    1. Add a string value with the name log_file and the desired location of the log file. For example: d:\ossoplugin.log)

    2. Add a string value with the name log_level and a value for the desired log level. Valid values are debug, inform, error and emergency.

  4. Using the IIS management console, add a new virtual directory to your IIS Web site with the same physical path as that of oracle_osso.dll. Name the directory osso and give it execute access.

  5. Using the IIS management console, add oracle_osso.dll as a filter in your IIS Web site. The name of the filter should be osso and its executable must point to the directory containing oracle_osso.dll.For example, d:\osso\oracle_osso.dll.

  6. Stop and then start the IIS Server, ensuring that the filter is marked with a green up-pointing arrow.


    Note:

    To restart IIS, you must stop all of the IIS services through the control panel, or restart the computer. This is the only way to ensure that the .dll is reloaded (restarting IIS through the management console is not sufficient).


Troubleshooting

This section describes common problems and possible reasons.

Oracle Dependency Libraries Not Found

SSO plug-in could not find the libraries it needs. Possible reason would be that you do not have ORACLE_HOME/lib included in your LD_LIBRARY_PATH on UNIX. On Windows, you do not have ORACLE_HOME/bin included in your PATH.

Single Sign-On Server Configuration File De-obfuscation Fails

Single sign-on server configuration file, for example, sso_conf, is obfuscated using a certain account and this account has to be the one being used to start your listener. For example, use the value of User specified in magnus.conf for Sun ONE and usually SYSTEM for IIS.

IIS Oracle Application Server SSO Plug-in Does Not Work with HTML Authentication

Oracle Application Server SSO Plug-in is not designed to work in concert with other authentication modules. It is either a native listener authentication module, or third-party module.


Go to previous page Go to next page
Oracle
Copyright © 2002, 2003 Oracle Corporation.

All Rights Reserved.
Go To Documentation Library
Home
Go To Product List
Solution Area
Go To Table Of Contents
Contents
Go To Index
Index