Skip Headers
Oracle® Access Manager Integration Guide
10g (10.1.4.0.1)

Part Number B25347-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

14 Integrating Smart Card Authentication

Oracle Access Manager 10g (10.1.4.0.1) supports Smart Card authentication with Active Directory and IIS Web servers in homogeneous Windows® environments.

The following discussions explain how to implement Smart Card authentication:

14.1 About Smart Card Authentication

Smart Card provides a stronger form of authentication than a username and password alone because it is based on something the user knows and something the user has.

Smart Card authentication can be used with Oracle Access Manager to protect resources. After setting up your environment, Smart Card authentication is triggered when you:

The first method displays a window prompting you for your PIN, rather than requesting a username, password, and domain. The second method displays a window prompting you to insert the ActivCard and provide your PIN.


Note:

When you initialize a Smart Card, you are asked to supply a PIN. If the PIN is incorrectly entered three times, the card locks. To restore a locked certificate, either use the unlock code provided during Smart Card initialization or re-initialize the card.

14.2 About Oracle Access Manager Components

The Identity System provides the applications you need to manage users, groups, organizations, identity-based workflows, and delegated administration.

The Access System provides policy-based authentication, authorization, auditing, and Web single sign-on. All Access System components are involved with Smart Card authentication, as discussed next:

14.3 Integration Architecture

The following process occurs during Smart Card authentication with Oracle Access Manager. Figure 14-1 illustrates the sequence and is followed by a process overview.

Figure 14-1 ActivCard Authentication Sequence

Graphic of ActivCard Authentication Sequence

Process overview: Smart Card authentication

  1. The browser prompts the user for the Smart Card and the WebGate intercepts the user's resource request and queries the Access Server to determine if and how the resource is protected, and if the user is authenticated.

  2. The Access Server queries the Active Directory server for authentication information and receives information from the directory.

  3. The Access Server responds to the WebGate, which prompts the browser to challenge the user to either insert their ActivCard and/or enter their PIN.

  4. The user submits their credentials, which the browser passes to the WebGate and the WebGate presents to the Access Server, at which point one or more authentication plug-ins are used.

    The cert_decode and credential_mapping plug-ins are required with the Client Certificate authentication scheme.

  5. The Access Server performs the authentication dialog with the Active Directory, which maps the certificate information stored in the Smart Card to the user certificate in the directory and returns a success response to the Access Server.

  6. When the user's credentials are valid, the Access Server provides the response to the WebGate, which starts a session for the user.

  7. The WebGate queries the Access Server for resource authorization.

  8. The Access Server queries Active Directory for authorization information that allows or denies access based upon the policy domain's authentication and authorization rules.

  9. When access is granted, the Access Server passes authorization to the WebGate, which presents the resource to the user.

14.4 Supported Versions and Platforms

See ActivCard Gold specifications and details about Smart Card standards and compatibility at http://www.actividentity.com.

Oracle Access Manager 10g (10.1.4.0.1) supports Smart Card authentication in the environments shown on Metalink. Refer to Metalink, as follows.

To view information on Metalink

  1. Go to the following URL:

    http://metalink.oracle.com

  2. Click the Certify tab.

  3. Click View Certifications by Product.

  4. Select the Application Server option and click Submit.

  5. Choose Oracle Application Server and click Submit.

14.5 Setting Up Smart Card Authentication

Several procedures must be completed to set up Smart Card authentication with Oracle Access Manager 10g (10.1.4.0.1).

Task overview: Setting up Smart Card Authentication

  1. Confirm your environment meets requirements in "Supported Versions and Platforms".

  2. Set up Active Directory, as described in "Preparing Active Directory".

  3. Set up a certificate, as described in "Preparing the CA and Enrolling for a Certificate".

  4. Set up the IIS Web Servers, as described in "Preparing IIS Web Servers".

  5. Set up Oracle Access Manager, as described in "Preparing Oracle Access Manager for Smart Card Authentication".

  6. Configure your protected resources, as described in "Protecting Resources with Oracle Access Manager".

  7. Set up IIS Manager, as described in "Setting Up the IIS Manager".

14.5.1 Preparing Active Directory

The following sections discuss preparing Active Directory.


Tip:

For more information about this procedure, see the Active Directory manual.

For details about setting up your Active Directory to operate with Oracle Access Manager, see the Oracle Access Manager Installation Guide and Oracle Access Manager Identity and Common Administration Guide.


To prepare Active Directory

  1. Ensure that you have a domain controller and Active Directory installed and properly running.

  2. Ensure that you have a Domain Name System (DNS) server installed and properly running.


Note:

You must install a Microsoft certification server with Active Directory, as discussed next.

14.5.2 Preparing the CA and Enrolling for a Certificate

The following sections discuss preparing the CA and enrolling for a certificate.


Tip:

For more information about the following tasks, see the ActivCard documentation, Configuring Smart Card logon with ActivCard CSP for Windows 2000.

To prepare a certification authority

  1. Confirm that you have met all setup requirements for certification authorities (CAs), install ActivCard Gold utilities, and set up the CA.

    If you want the user's certificate installed on the ActivCard only, rather than on both the machine and the ActivCard, you need at least two installations of the ActivCard Gold utilities because you need an administrator's certificate to digitally sign a user's certificate.

  2. Establish the certificate types that an enterprise certification authority can use.

  3. Prepare a certification authority to issue Smart Card certificates.

To complete Smart Card certificate enrollment

  1. Prepare a Smart Card certificate enrollment station on a computer that you will use to set up smart cards and install a ActivCard USB reader v2.0.

    If you want the user's certificate installed on the ActivCard only, rather than on both the machine and the ActivCard, you need multiple ActivCard USB Readers and at least two ActivCard Gold.

  2. Connect a Smart Card reader.

  3. Enroll for a Smart Card Logon or Smart Card User certificate, initialize the card, and digitally sign the request.

    For more information about downloading certificates onto ActivCards, see the ActivCard Gold User Guide.

  4. Log on with an ActivCard, as described in Configuring Smart Card logon with ActivCard CSP for Windows 2000.

  5. Set policies for Smart Card removal behavior.

14.5.3 Preparing IIS Web Servers

The following sections describe preparing IIS Web Servers.


Tip:

For more information about the following tasks, see the ActivCard documentation, Configuring Smart Card logon with ActivCard CSP for Windows 2000.

To prepare the IIS Web server for certification authentication

  1. Deploy a certificate and the CA that issued the certificate within IIS on the Web server that hosts the WebGate.

  2. Enable SSL to protect communication on port 443 on the Web server that hosts the WebGate.

  3. Enable client certificate authentication within IIS.

  4. Download a 1024-bit-length Web server certificate from your Microsoft certificate server.


Note:

Do not use a 512-bit-length certificate.

14.5.4 Preparing Oracle Access Manager for Smart Card Authentication

The following sections describe preparing Oracle Access Manager for Smart Card authentication.


Tip:

For more information, see the Oracle Access Manager Installation Guide

To prepare Oracle Access Manager for Smart Card authentication

  1. Ensure that Oracle Access Manager is properly installed and running with Active Directory, including the latest patches, for example:

    • Identity Server and WebPass

    • Policy Manager and Access System Console

    • Access Server and WebGates

  2. Confirm that SSL is enabled on the IIS Web server hosting the WebGate.

14.5.5 Protecting Resources with Oracle Access Manager

You need to modify the Client Certificate authentication scheme and add it to a policy domain to protect resources for Smart Card authentication.

Steps are provided in this procedure. For additional information, see the Oracle Access Manager Access Administration Guide

To configure the authentication scheme for Smart Card

  1. Navigate to the Access System Console, Access System Configuration tab, Authentication Management function.

  2. Create or modify the Client Certificate authentication scheme to use the X509Cert challenge method, as shown in the example in Figure 14-2.

    Figure 14-2 Client Certificate Authentication Scheme for Smart Card

    Client Certificate Authentication Scheme for Smart Card
  3. Click the Plug-Ins tab and ensure that the cert_decode and credential_mapping plug-ins contain appropriate parameters and values for Smart Card authentication, as shown in the example in Figure 14-3.

    For more information, see "Client Certificate Authentication Schemes".

    Figure 14-3 Smart Card Authentication Scheme Plug-In Parameters

    Smart Card Authen. Scheme Plug-In Parameters

    This scheme will appear in the Authentication Scheme list when you add authentication rules to the policy domain.

Next, you create a policy domain in the Policy Manager. Steps are provided here and additional information is available in "About Policy Domains for Smart Card Authentication".

To protect resources

  1. Navigate to the landing page for Access System administration:

    http://hostname:port/access/oblix

  2. Select the Policy Manager application, and click Create Policy Domain in the left navigation pane.

    For example:

    Name—Your Choice.Description—Optional
    
    

    Note:

    Do not enable the policy domain until all specifications are completed.

  3. Click Save.

  4. Click the Resources tab, then click Add and add a resource.

    For example:

    Resource Type—Your ChoiceURL Prefix—Your ChoiceDescription—Optional
    
    
  5. Click Save.

  6. Click Authorization rules, and configure those that apply to your policy domain and resource, then confirm or add plug-in parameters, as usual.

  7. Click the Default Rules tab, click the Add button, enter the details for the authentication rule and confirm that you are using the modified Client Certificate authentication scheme.

    For example:

    Name—Your choiceDescription—OptionalAuthentication Scheme—Client Certificate
    
    
  8. Add an access policy, as needed.

    Delegating Administration is done as usual. There are no special requirements. For more information, see the Oracle Access Manager Identity and Common Administration Guide.

  9. Click the General tab and enable the policy domain, as usual.

  10. Continue with "Setting Up the IIS Manager".

14.5.6 Setting Up the IIS Manager

Next you must configure the Oracle Access Manager cert_authn.dll to "accept cookies", in the Internet Services Manager.

To configure the cert_authn.dll

  1. Navigate to the Internet Services Manager: Start, Programs, Administrative Tools, Internet Services Manager.

  2. Expand the host, double click the Default Web Site (or another Web site if you are not using the default), then navigate to and double-click the cert_authn.dll.

    For example:

    hostname > Default Web Siteaccess\oblix\apps\webgate\bin\cert_authn.dll
    
    

    Note:

    If the ISAPI WebGate installation configuration is performed manually, the following information will be presented on an HTML page:

    "If you are using client certificate authentication you must enable client certificates for the WebGate and SSL must be enabled on the IIS Web server hosting the WebGate. Once this is done, do the following steps to enable client certificates for the WebGate:"


  3. Select the File Security tab, then click Edit in the Secure Communications panel at the bottom of the window: File Security, Secure communications Edit.

  4. In the Client Certificate Authentication subpanel, enable Accept Certificates.

  5. Click OK in the Secure Communications window, and click OK in the cert_authn.dll Properties window.

14.6 About Policy Domains for Smart Card Authentication

The key to creating an effective policy domain is to group the content that you want to manage in the same way. In this case, you will group resources that require Smart Card authentication under one policy domain.

Each policy domain includes a definition of the authentication scheme, rules, optional policies, administrative rights, and resources to protect. Only one authentication rule is allowed per policy domain or policy. Only one authentication scheme is allowed per rule to enforce authentication.The default rule applies unless you set overriding policies (exceptions) for specific resources (URL patterns).

Authentication Scheme: An existing authentication scheme must be specified as the building block for a rule. The Client Certificate authentication scheme is required for Smart Card authentication. For more information, see "Client Certificate Authentication Schemes".

Administrative Rights: Administrative rights for the policy domain are optional. Until the Master Access Administrator delegates administration rights to a policy domain, he or she is the only person who can access it. All Administrators may create an authentication rule for a policy domain or a policy (exception). Only a Master Access Administrator or a Master Administrator may add resources to a policy domain.

Resources: Resources may be either static content such as HTML pages, .gifs, and .pdfs, or dynamic content such as scripts, applications, and EJBs.

For more information about policy domains, see the Oracle Access Manager Access Administration Guide.

14.7 Client Certificate Authentication Schemes

Oracle Access Manager automatically configures the default Client Certificate authentication scheme if the Master Administrator selected this option during Access System installation. This scheme may be set up and/or modified after installation.

The Client Certificate scheme indicates that the user must supply a digital certificate to the policy domain to complete authentication. Oracle Access Manager supports client certificate authentication using public key encryption cryptography and X.509 certificates.

Your organization can determine how to obtain a certificate; there are no Oracle Access Manager requirements for this.

When you use the Oracle-provided schemes and plug-ins, you must be sure the obMappingFilter of the plug-in parameter is set correctly for your directory and environment. For additional information, see:

14.7.1 Smart Card Challenge Method, Parameter, SSL

Each authentication scheme requires a challenge method to obtain user credentials for authentication. Only one challenge method is allowed per authentication scheme. Smart Card authentication has no Challenge Redirect requirement; however, the following is required:

  • Smart Card authentication requires the X509Cert Challenge Method and X509 Challenge Parameter, which support public key encryption cryptography and X.509 certificates.

  • Smart Card authentication requires an SSL connection.

    The X509Cert challenge method uses the Secure Sockets Layer (SSL) version 3 certificate authentication protocol (SSLv3) certificate authentication protocol built into browsers and Web servers. Authenticating users with a client certificate requires the client to establish an SSL connection with a Web server that has been configured to process client certificates.


    Note:

    Smart Card authentication has no Challenge Redirect requirement.

14.7.2 Plug-Ins for Smart Card Authentication

Two plug-ins supplied with Oracle Access Manager are required with the Client Certificate authentication scheme for Smart Card authentication. The order of execution in the Client Certificate authentication scheme for Smart Card logon is as follows.

Authentication Scheme Plug-Ins and Order of Execution
Client Certificate
  1. cert_decode
  2. credential_mapping


Each plug-in defines how information will be looked up in the directory server. A number of parameters are available depending upon the plug-in. For more information, see "cert_decode Plug-In" and "credential_mapping Plug-In".

If your certificate is stored in the browser, you can view the certificate details. For more information, including the OIDs of the attributes that are supported by the Access Server with the corresponding suffix used to retrieve the attribute, see the Oracle Access Manager Access Administration Guide.

14.7.2.1 cert_decode Plug-In

The cert_decode plug-in can be used with the X509Cert challenge method and must be included in the Client Certificate authentication scheme for Smart Card authentication.

The cert_decode plug-in has no parameters and does not use a data source. This should be the first plug-in in the Client Certificate authentication scheme for Smart Card authentication.

cert_decode decodes the certificate and extracts the components of the certificate subject's and issuer's Distinguished Name. For each component, the plug-in inserts a credential with a certSubject or certIssuer prefix. For instance, if your certificates have a subject name such as givenName=somename, the plug-in will add the credential certSubject.givenName=somename to the credential list.

If decoding is successful, the elements of the certificate's subject and issuer DN are added to the list of credentials. If not, authentication fails.

14.7.2.2 credential_mapping Plug-In

The credential_mapping plug-in can be used with the X509Cert challenge method and must be included in the Client Certificate authentication scheme for Smart Card authentication.

The credential_mapping plug-in should be second in the Client Certificate authentication scheme for Smart Card authentication. This plug-in maps the user-provided information to a valid Distinguished Name (DN) in the directory using the following parameters:

obMappingBase="ou=company,dc=yourdc,dc=yourdc,dc=com"obMappingFilter="(&(objectclass=user=)(mail=%certSubject.E%))"

You can configure the attribute to which the user ID is mapped to find the DN by changing the obMappingFilter parameter as shown in the previous paragraph, where:

dc=the Active Directory Domain Controllermail=%certSubject.E%=maps the email in the Active Directory to the email in the certificate

With these concepts in mind, complete the steps under "Protecting Resources with Oracle Access Manager".

14.8 Troubleshooting

This section discusses the following troubleshooting tips for Smart Card authentication:

14.8.1 Problem Requesting X.509 Certificates

Oracle Access Manager requires X.509 certificates from Microsoft's Certification Server on Windows 2000 to be downloaded to the Smart Card. In this case, you need the ActivCard Gold for authentication.

Problem

You request a certificate for Smart Card from the following Web page:

http://hostname/cersrv/certsces.asp

You see the message "Downloading ActiveX Controls..." yet never complete the process.

Solution

  1. Visit the following Web page:

    http://www.microsoft.com/windows2000/downloads/critical/q323172/default.asp

  2. Obtain security patch Q323172 for certificate downloads with IIS.

14.8.2 Additional Resources

There are several sources of information that you may find useful when setting up Smart Card authentication for Oracle Access Manager 10g (10.1.4.0.1).

14.8.2.1 Active Directory Resources

For more information about setting up Active Directory, see:

14.8.2.2 Smart Card Resources

For more information about setting up ActivCard utilities and the Smart Card, see the documentation that accompanies your ActivCard product packages, including:

  • ActivCard Gold User Guide

  • ActivCard: Configuring Smart Card logon with ActivCard CSP for Windows 2000

  • ActivCard Trouble Shooting Guide

For general information about smart cards, see:

  • Microsoft Step-by-Step Guide to Installing and Using a Smart Card Reader

  • Microsoft Step-by-Step Guide to Mapping Certificates to User Accounts

14.8.2.3 Oracle Access Manager Policy Domain Details

For more information about setting up protecting resources with Oracle Access Manager policy domains, see the Oracle Access Manager Access Administration Guide.