Skip Headers
Oracle® Access Manager Integration Guide
10g (10.1.4.2)

Part Number E10356-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

11 Integrating with IBM WebSphere

The Oracle Access Manager Connector for WebSphere enables you to integrate applications running on IBM's WebSphere Application Server with the Access System's authentication and authorization services. The connector also makes users and groups managed by Oracle Access Manager available for authentication and authorization within WebSphere.

This chapter describes how prepare your environment, then install, set up, and test the Oracle Access Manager Connector for WebSphere, and configure your WebSphere Application Server for Oracle Access Manager.

This chapter covers the following topics:

11.1 About the Connector for WebSphere

The Oracle Access Manager Connector for WebSphere enables WebSphere Application Server administrators to integrate applications running on WebSphere with Access System authentication and authorization services.

Using the Connector for WebSphere, users who try to access Access System-protected WebSphere resources are challenged and authenticated by the Access System. The connector also makes Identity System-managed users and groups available for authentication and authorization.

Advantages of using the Connector for WebSphere include:

The following is an overview of the integration.

Task overview: Integrating with the WebSphere Application Server

  1. Prepare your environment, as described in "Preparing Your Environment".

  2. Install the Connector, as described in "Installing the Connector for WebSphere".

  3. Set up and test the Connector, as described in "Completing Connector Setup".

  4. Configure your WebSphere Application Server, as described in "Configuring WebSphere Application Server v5".

  5. Integrate with the WebSphere Portal Server, if this is part of your environment, as described in "Integrating with WebSphere Portal".

Oracle Access Manager supports the WebSphere Application Server Network Deployment architecture. The Network Deployment architecture comprises of a set of Application Server nodes managed together as a cell. Use the following steps to integrate Oracle Access Manager with the Network Deployment architecture:

  1. Complete the preceding steps, numbered 1 to 5, to separately integrate each standalone node with Oracle Access Manager. You must complete the integration before configuring the Network Deployment architecture.

  2. Set up the Network Deployment architecture. For more information, refer to the IBM WebSphere InfoCenter documentation at:

    http://publib.boulder.ibm.com/infocenter/wasinfo/v5r0/index.jsp?topic=/com.ibm.websphere.base.doc/info/welcome_base.html

As you complete activities in this chapter, you will see the following path name formats:

Identity_install_dir: The directory where you installed the Identity Server. In your installation, for example, this may be C:\OracleAccessManager. During installation the \identity subdirectory is added to the specified destination making the full path to the directory where you installed the Identity Server Identity_install_dir\identity.

WebGate_install_dir: The directory where you installed the Access System WebGate. In your installation, for example, this may be C:\OracleAccessManager\Webcomponent. During installation the \access subdirectory is added to the specified destination making the full path to the directory where you installed the WebGate WebGate_install_dir\access.

CWS_install_dir: The directory where the Connector for WebSphere was installed. In your installation, for example, this may be C:\OracleAccessManager\NetPointWASRegistry.

WAS_install_dir: The directory where the WebSphere Application Server is installed. In your installation, for example, this may be C:\IBM\WebSphere\AppServer.

WPS_install_dir: The directory where the WebSphere Portal Server is installed. In your installation, for example, this may be C:\IBM\WebSphere\PortalServer. This directory is used for the Portal logs such as, WPS_install_dir/log/appserver-out.log.

When you see one of the notations shown in the previous paragraphs, substitute the appropriate path name for your environment as you complete the step.

The rest of this section discusses the following topics:

11.1.1 WebSphere Components

For complete support information, see "Supported Versions and Platforms". The following WebSphere components are used in the integration between WebSphere and Oracle Access Manager:

WebSphere Application Server (WAS): The WebSphere Application Server (WAS) enables secure, high volume transactions and Web services.

  • WAS 5.0/5.1 is J2EE 1.3 compliant

  • WAS 6 and 6.1 are J2EE 1.4 compliant

Note:

Both implement authorization using the EJB1.1 specification for security roles. A security role is a set of permissions for access to Web resources and specific EJB methods.

WebSphere Portal Server (WPS): The WebSphere Portal Server provides single sign-on for portlets based on the Java Authentication and Authorization Services (JAAS). The single sign-on implementation enables portlet developers to extract:

  • A user's username and password, and distinguished name (DN)

  • The DNs of any groups that the user belong to

  • The WebSphere Application Server CORBA Credential

  • The LTPA token

Any combination of these objects can be used to provide single sign-on to the portlet's back end. For example, the username and password may be used to create a Basic Authentication HTTP header. Or the LTPA Token may be used to provide single sign-on to another WebSphere Application Server in the same security domain.

Web Trust Association Interceptor (TAI): The TAI is used for third-party proxy authentications. The WebSphere Application Server uses the TAI to enforce the trust policy between WebSphere and third-party security providers for single sign-on. The TAI enables the Access System to authenticate users who try to access resources on the WebSphere Application Server.

Application Assembly Tool (AAT): The AAT is used to build security-aware applications. You use the AAT to define WebSphere roles and bind them to Identity System users and groups.

11.1.2 Connector for WebSphere Components

The Connector for WebSphere uses the Trust Association Interceptor (TAI), the Identity System, the Access System, and the following components:

NetPointWASRegistry: This is the Connector for WebSphere. The NetPointWASRegistry is a user data store implementation of the WebSphere CustomRegistry in Oracle Access Manager. The NetPointWASRegistry serves as a plug-in to the WebSphere Application Server (WAS).

The WebSphere CustomRegistry is also known as a custom user registry (CUR). The CustomRegistry defines the methods that the WAS uses to perform security operations for applications configured to use them. For example, the WebSphere CustomRegistry may be used to identify attributes such as username and password, and to combine user information from diverse data sources.

The NetPointWASRegistry consists of the Access Manager SDK and Identity XML. The NetPointWASRegistry establishes a native connection between the WAS and Oracle Access Manager, enabling WebSphere administrators to use policy-based security features to control user access to business applications.

IdentityXML: The Connector for WebSphere uses IdentityXML calls to get user and group information from the Identity Server. Typically, you use IdentityXML to integrate the Identity System with external software systems and to perform Identity System functions programmatically rather than using the Identity System GUI.

Access Manager SDK: The Access Manager Software Developer's Kit (SDK) enables you to create an interface that can be built into WebSphere and to create an AccessGate that communicates with the Access Server for authentication purposes. The SDK is installed automatically when you install the Connector for WebSphere. The SDK is used by the TAI.

Custom Member Repository (CMR): The CMR is an extension of the Oracle Access Manager component called NetPointWASRegistry (a custom user registry). It resides on the WebSphere Portal Server. The WebSphere Portal Server uses WebSphere Application Server security for authentication when logging in to the Portal. The WebSphere Portal Server enables users to customize and personalize their experience and uses a component called Member Services to manage information about users, user accounts, user profile attributes, and group memberships.

The CMR is an instance of a Member Services component. The CMR connects the WebSphere Portal Server to the Identity System users and groups. The CMR implements the IBM WebSphere MemberRepository interface, and is used to assign and determine access control to the portlets. The CMR stores user.baseattributes and group.baseattributes. It supports only read operations, not create or modify or delete operations.

The WebSphere Portal Server will use the CMR to make IdentityXML queries like getAttributes for a user for personalization, getGroupMemberships, search users by attribute, and similar functions.

Note:

The Connector for WebSphere does not support getGroupMemberships. As a result, in the case of Nested Groups, if you check for inner group membership the parent group details will not be displayed.

For more information, see the "Supported Versions and Platforms".

11.2 Integration Architecture

The integration between WebSphere and Oracle Access Manager can vary depending on if you use only the NetPointWASRegistry or if you also use the Access System's single sign-on. For details, see:

For additional information, see "Mapping Users and Groups to Security Roles in WAS". See also "Integration Scenario with the Oracle Access ManagerCMR".

11.2.1 Scenario 1: Use of NetPointWASRegistry

The NetPointWASRegistry obtains Identity System-managed user and group information and performs authentication based on that information.

Figure 11-1 illustrates an implementation of the Connector for WebSphere using the NetPointWASRegistry.

Figure 11-1 Integrating the WebSphere Application Server with the NetPointWASRegistry

WAS integration with NetPointWASRegistry.

In this scenario, use of a WebGate is optional. The WebGate is needed only for single sign-on or to protect the WebPass.

Note:

In this scenario, The WAS and both the Web servers must belong to the same domain.

Process overview: Login using WAS with the NetPointWASRegistry

  1. A user tries to access a WebSphere resource through a browser.

  2. The WAS forwards the user's request to the Connector for WebSphere.

  3. The Connector for WebSphere checks with the Access Server and authenticates the user.

  4. If single sign-on is enabled in the WAS, an LTPA token is generated.

  5. The Connector for WebSphere queries the Identity Server via WebPass for a list of groups to which the user belongs.

    The Identity Server checks the directory and returns the information to the Connector for WebSphere.

  6. The Connector for WebSphere returns this information to the WAS.

  7. The WAS checks the deployment descriptor for a user-security or group-security role mapping.

    If the user or group belongs to a security role that is allowed to access the resource, the WAS enables the user to access the resource.

11.2.2 Scenario 2: Architecture for Single Sign-On

The Access System's single sign-on feature enables authenticated users to access protected resources without having to re-authenticate. To use the Access System's single sign-on, you must enable the TAI and install an AccessGate plug-in on the Web server servicing WAS.

Figure 11-2 illustrates WAS using Access System single sign-on.

Figure 11-2 Single sign-on with the WebSphere Application Server

SSO with WAS.

Note:

In this scenario, a WebGate is required for single sign-on.

Process overview: Login using the WAS with Access System single sign-on

  1. The user attempts to access an WebSphere resource that is protected by the Access System.

  2. WebGate (or AccessGate) intercepts the request and prompts for a username and password, using the Basic challenge method.

  3. WebGate passes the user's credentials to the Access Server.

    The Access Server checks the user data store (the directory) and authenticates the user. WebGate sets an ObSSOCookie in the request.

  4. The Web server forwards the user request to the WAS.

    The Oracle Access Manager TAI gets the request and confirms that the user has been authenticated.

  5. WAS recognizes that the Access System has authenticated the user and creates an LTPA token.

    The remaining steps in this process are the same as steps 5-7 in Scenario 1. The WAS and both Web servers must belong to the same domain.

  6. The Connector for WebSphere queries the Identity Server via WebPass for a list of groups to which the user belongs.

    The Identity Server checks the directory and returns the information to the Connector for WebSphere.

  7. The Connector for WebSphere returns this information to the WAS.

  8. If you are using the Oracle Access Manager CMR, the Portal Server is invoked, as described in "Integration Scenario with the Oracle Access ManagerCMR".

    If you are not using the CMR, the WAS checks the deployment descriptor for a user-security or group-security role mapping. If the user or group belongs to a security role that is allowed to access the resource, the WAS allows the user to access the resource.

11.2.3 Mapping Users and Groups to Security Roles in WAS

WebSphere security is consistent with J2EE role-based security specifications. Roles are specified in the deployment descriptors for an application. When the application is installed, these roles are bound to Oracle Access Manager users or groups. You can change the binding information for roles in an application through the WebSphere Administrative Console.

Oracle Access Manager manages users and groups. WebSphere manages roles with the help of the AAT or via the Administration Console. The following illustration shows Oracle Access Manager mappings of Identity System users to Identity System groups and Identity System users and groups to WebSphere roles. It also shows WebSphere mappings of methods to roles.

Illustration of mapping users and groups.

In the WAS 5 Administrative Console, the role of "Admin" is special. Any user added to the role "Admin" in the Identity System must be in a group called "Admin" or "Administrator". Otherwise, this user may not be able to login to the Administrative Console. Other roles, like "monitor" have no restrictions. Therefore, any Oracle Access Manager user added to these roles in the WAS 5 Administrative Console, can log in to the WAS 5 Administrative Console.

11.3 Integration Scenario with the Oracle Access ManagerCMR

During login, the user is authenticated as depicted in "Integration Architecture". Without the CMR, the WebSphere Portal Server must communicate directly with the LDAP directory server to obtain user, group, and personalization information. With the CMR, communication between the WebSphere Portal Server and the directory server can be eliminated. The CMR performs read operations through the NetPointWASRegistry with the directory server.

Figure 11-3 shows the interaction between the WebSphere Portal Server, CMR, and LDAP directory server during the login authorization process. This follows processes described in "Integration Architecture".

Figure 11-3 WebSphere Portal Server and the Custom Member Repository

Using WAS and the CMR.

Process overview: Authorization with the CMR

  1. After authentication, a user requests access to a portlet through the WebSphere Portal Server.

  2. The Portal Server forwards the request to the Oracle Access Manager CMR.

  3. The CMR forwards the request to the NetPointWASRegistry.

  4. The NetPointWASRegistry sends an IdentityXML call to the Identity Server or uses the Access Manager SDK to contact the Access Server through WebPass or WebGate, depending upon the required method.

    For instance, the Access Manager SDK uses the checkPassword method while IdentityXML uses all other methods:

    • findByAttribute to search users by attribute

    • get

    • getGroupMemberIdentifiers

    • getMemberAttributes

    • getMemberships

    • IsAttributeSupported

    • searchMembers

  5. The Identity Server (or Access Server) communicates with the LDAP directory server.

  6. The directory server returns information.

11.4 Supported Versions and Platforms

The Connector for WebSphere includes the Oracle Access Manager Custom Member Repository (CMR) for the WebSphere Portal Server. The Connector for WebSphere supports the WebSphere Application Server v5.0 and 5.1 with the CMR.

Any references to versions and platforms in this chapter are for demonstration purposes.

You can find support and certification information at the following URL:

http://www.oracle.com/technology/documentation/

You must register with OTN to view this information.

Also, you can see the supported versions and platforms for this integration on Metalink, as follows.

To view information on Metalink

  1. In your browser, enter the following URL:

    https://metalink.oracle.com

  2. Log in to MetaLink.

  3. Click the Certify tab.

  4. Click View Certifications by Product.

  5. Select the Application Server option and click Submit.

  6. Choose Oracle Identity Management and click Submit.

  7. Click Oracle Identity Management Certification Information 10g (10.1.4.0.1) (html) to display the Oracle Identity Management page.

  8. Click the link for Section 6, Oracle Access Manager Certification to display the certification matrix.

11.5 Preparing to Install the Connector

Before you can install and configure the Connector for WebSphere, you must complete the following tasks.

Task overview: Preparing to install the Connector for WebSphere

  1. Install IBM and Oracle Access Manager components, as described in "Preparing Your Environment".

  2. Configure the Identity Server after installation, as described in "Configuring the Identity System for WAS Integration".

  3. Complete Access System configuration, as described in "Configuring the Access System for WAS Integration".

  4. Set up resource protection, as described in "Configuring Resource Protection in the Access System".

  5. Define a policy domain for the Websphere Administration Console, as described in "Defining a Policy Domain for the WebSphere v6.0 Administration Console".

11.5.1 Preparing Your Environment

Preparing your environment includes installing the appropriate IBM applications and Oracle Access Manager.

To prepare your environment for integration

  1. Ensure that your environment meets the requirements under "Supported Versions and Platforms".

  2. Install and configure the following IBM applications and components using the IBM documentation for these products:

    1. IBM WebSphere Application Server

    2. Application Assembly Tool (AAT)

    3. WebSphere Portal Server.

      The Oracle Access Manager CMR requires the WebSphere Portal Server. References to specific versions are for demonstration purposes. See "Supported Versions and Platforms" for details.

  3. WebSphere Portal Server v5: See "Supported Versions and Platforms" then follow instructions from IBM as you complete one of the following steps to ensure you have an up-to-date version that includes Fix Pack PQ93461:

    Note:

    Fix Pack PQ93461 is already included incorporated in Portal 5.1.
    • Install a new WebSphere Portal 5.0.2 instance using the installation program provided for v5.0.2.

    • Upgrade an existing installation of WebSphere Portal 5.0 to v5 .0.2.

    • Install a new WebSphere 5.1 Portal instance using the installation program provided for v5.1.

    • Upgrade an existing installation of WebSphere Portal 5.0 or 5.0.2 to 5.1

  4. Install and setup Oracle Access Manager components, as described in the Oracle Access Manager Installation Guide:

    1. Identity Server

    2. WebPass

    3. Policy Manager

    4. Access Server

    5. WebGate

    6. AccessGate

  5. Configure the WAS integration, as follows:

    1. Identity System: See "Configuring the Identity System for WAS Integration" for details.

    2. Access System: See "Configuring the Access System for WAS Integration" for details.

  6. Configure Access System resource protection for WAS, as described in "Configuring Resource Protection in the Access System".

11.5.2 Configuring the Identity System for WAS Integration

The Identity Server and WebPass are the two main components of the Identity System. WebPass is an Access System plug-in for Web servers. When a user requests access to a Web server resource, the WebPass redirects the request to a Identity Server, which then checks the user's identity through the directory server.

After you install the Identity Server and a WebPass, you must set up the Identity System, as explained in the Oracle Access Manager Installation Guide. After setup, you configure the Identity System for integration as follows.

Task overview: Configuring the Identity System for WAS integration

  1. Prepare for WebPass failover, if desired, as described in "Configuring WebPass Failover".

  2. Setup the Identity Server for WAS, as described in "Configuring the Identity Server".

11.5.2.1 Configuring WebPass Failover

Oracle Access Manager uses failover to maximize performance and provide uninterrupted service to end users. Failover redirects requests in the event that a server fails. You must install a WebPass plug-in on each Web server. You may want to install multiple instances of WebPass. Later you may configure these for failover.

For more information, see "Configuring Multiple WebPass Instances for the Connector".

11.5.2.2 Configuring the Identity Server

The Identity Server is the Oracle Access Manager component that provides user and group information to the WAS. You must configure the Identity Server to be compatible with search methods that may be used with the WAS.

You will configure the account for the NetPointWASRegistry Admin user. The administrator's login will be used to make IdentityXML calls to the Identity Server. The NetPointWASRegistry Admin user does not need to be the Master Administrator. For example, the NetPointWASRegistry Admin user may be the Master Identity Administrator. However, if you prefer to limit the rights, the administrator you assign must possess at least the following rights:

  • View access on the class attribute of the user class.

  • View access on the class attribute of the Group class.

  • The appropriate searchbase for the user and group class.

  • GRANT+READ right on the class attribute of the user class.

  • GRANT+READ right on the class attribute of the Group class.

  • View access on those attributes listed in the call. For example: login ID, group member, group dynamic filter, and so on.

To configure the Identity Server after installation

  1. Open the oblixappparams.xml file and set the searchstringMinimumLength to zero:

    Identity_install_dir \identity\oblix\apps\common\bin\oblixappparams.xml

    <NameValPair ParamName="searchstringMinimumLength" Value="0"/>

    where Identity_install_dir is the directory where you installed the Identity Server.

  2. Open the groupservcenterparams.xml file and set the groupMemberSearchStringMinimumLength to zero:

    Identity_install_dir \identity\oblix\apps\groupservcenter\bin\groupservcenterparams.xml

    <NameValPair ParamName="groupMemberSearchStringMinimumLength" Value="0"/>

  3. Restart the Identity Server.

    The next step must be completed after Identity System setup.

  4. From the Identity System Console, click the User Manager tab, then click the Configuration sub-tab.

  5. Click the Delegated Administration link and provide an administrator with the required View and Delegated Administration rights, as follows.

    Caution:

    Do not check the Delegate Right box beside Grant Read Right.

    Screen shot showing Delegate Rights.
  6. Restart WAS and the WAS Admin Console to have the change take effect.

    For more information about configuring administrators, see the Oracle Access Manager Identity and Common Administration Guide.

11.5.3 Configuring the Access System for WAS Integration

The Access System has three main components: the Policy Manager, the Access Server, and the WebGate. Installation and configuration considerations for Access System components in a WAS integration are discussed here.

Policy Manager: The first component you install is the Policy Manager. You use the Policy Manager to create and manage policy domains to protect resources, and to test policy enforcement. The Access System Console is a part of the Policy Manager. The Access System Console is used for system configuration and system management tasks such as configuring administrators, managing logs, and configuring instances of AccessGates and Access Servers.

Access Server: You also must install at least one Access Server. However, it is recommended that you install at least two Access Servers on two different machines to ensure uninterrupted service to your users.

Each Access Server can be configured to communicate with one or more WebGate instances, and to communicate with a directory server. Access Servers record their activity in Greenwich Mean Time (GMT) because you could have servers operating in several time zones.

WebGate: The WebGate component is optional. You will need it if you want to support single sign-on and if you want to protect the WebPass.

AccessGate: An AccessGate is a an Access System component that processes Web and non-Web resource requests from users or applications. The Connector for WebSphere uses an AccessGate to communicate with the Access Server.

11.5.3.1 Configuring the AccessGate for WAS Integration

Before installing the Connector for WebSphere, you must install and configure an AccessGate. WebSphere intercepts user requests and passes them on to the Connector for WebSphere. The Connector uses the AccessGate to make calls to the Access Server for authentication and authorization of the requests.

To configure the AccessGate for the NetPointWASRegistry

  1. Navigate to the AccessGate Configuration page:

    From the Access System Console, click Access System Configuration, then click AccessGate Configuration.

  2. Click the Add button to display the Add a new AccessGate page.

  3. Complete the following information:

    • AccessGate Name: Unique, descriptive name for this AccessGate. Use an alphanumeric string, and do not include spaces in the name.

    • Hostname: Name of the machine where the AccessGate will be installed.

    • Port: You do not need to specify a port. An AccessGate, unlike a WebGate does not require a port number. See the Oracle Access Manager Access System Administration Guide for details.

    • AccessGate Password and Re-type AccessGate Password: Unique password to verify and identify the component regardless of the transport security mode. This should differ for each AccessGate instance.

    • Access Management Service: This service only needs to be enabled if the Access Server that you are associating with this AccessGate has Access Management Service set to On.

    • Transport Security: Level of transport security to and from the Access Server. The default value is Open. The transport security mode of the AccessGate must match the transport security mode of the Access Server.

    See the Oracle Access Manager Access System Administration Guide for details on transport security.

  4. Click Save.

    The Details for the AccessGate page appears.

  5. Click the List Access Servers (or List Clusters) button to associate this AccessGate with the appropriate Access Server.

  6. Click the Add button to add a new Access Server to associate with this AccessGate.

  7. Select an Access Server from the list, and define the configuration for this Access Server.

  8. Review the page that is returned.

For more information about AccessGates, see the Oracle Access Manager Access System Administration Guide.

11.5.4 Configuring Resource Protection in the Access System

The following procedures must be completed to configure the Access System to protect resources for WebSphere.

Task overview: Configuring resource protection in the Access System

  1. Identify a resource type, as described in "Defining a Resource Type for WebSphere".

  2. Create an authentication scheme, as described in "Defining an Authentication Scheme for WebSphere".

  3. Create a policy domain in the Access System, as described in "Defining a Policy Domain for WebSphere".

  4. For WebSphere Application Server v6.0, create a policy domain in the Access System, as described in "Defining a Policy Domain for the WebSphere v6.0 Administration Console".

11.5.4.1 Defining a Resource Type for WebSphere

Define a resource type for WebSphere, as described in the following procedure. See the Oracle Access Manager Access System Administration Guide for details on defining resource types.

In the following procedure you must provide the resource type values exactly as specified. If you need to specify a different resource name, you must change the resource name in the following locations:

  • CWS_install_dir \oblix\config\NetPointWASRegistry.properties

    where CWS_install_dir is the directory where the Connector for WebSphere was installed.

  • WAS_install_dir \properties\webgate.properties

    where WAS_install_dir is the directory where the WebSphere Application Server is installed.

By default, these configuration files assume you entered the values specified in the following procedure.

To define a resource type for WebSphere

  1. From the Access System Console, click Access System Configuration, then click Common Information Configuration.

  2. Click Resource Type Definitions.

    The Details for Resource Type page appears.

  3. Define and save the resource type as follows:

    • Resource Name: Authen

    • Display Name: WebSphere Authentication Scheme

    • Resource Matching: Case Insensitive

    • Resource Operation: LOGIN.

  4. Restart the Access Server to make this new resource available.

11.5.4.2 Defining an Authentication Scheme for WebSphere

You need to define an authentication scheme for WebSphere. The authentication scheme provides a method to be used when determining whether a user is allowed to access an Access System-protected WebSphere resource.

Note:

See the Oracle Access Manager Access System Administration Guide for more information on authentication schemes.

To define an authentication scheme for WebSphere

  1. From the Access System Console, click Access System Configuration, then click Authentication Management.

  2. Define and save the authentication scheme as follows.

    • Name: WebSphere Basic Over LDAP

    • Description: Used to protect WebSphere-related URLs

    • Level: Enter a number for security level that is lower than or equal to the level specified in the authentication scheme protecting the WebSphere and Portal Server URLs. For details, see "Configuring the TAI for WebSphere v5" or "Configuring the TAI for WebSphere 6 and 6.1".

    • Challenge Method: Basic

    • Challenge Parameter: Set the challenge parameter for the user credentials that you want to map.

    • SSL required: No

    • Challenge Redirect: Enter information in this field if you are going to redirect the end user's request to another server for the authentication process. The most common use of this field is to redirect from a non-SSL server to an SSL server. Redirection is transparent to the end user.

    • Plug-ins: Select Access System plug-ins to create a customized challenge scheme. For example, the Oracle Access and Identity challenge scheme requires the validate_password and credential_mapping plug-ins.

    Now you need to create a policy domain for the WebSphere Application Server, as described next.

    Note:

    See the Oracle Access Manager Access System Administration Guide for details on policy domains.

11.5.4.3 Defining a Policy Domain for WebSphere

You need to use the Access System to create a policy domain for WebSphere. This policy domain identifies the authentication scheme that WebSphere will use to protect the resource type that you configured in "Defining a Resource Type for WebSphere". You also define an action in the Access System. This action creates a user attribute for the WebSphere Application Server. When a user is authenticated to WebSphere, the user ID defined on the action is sent to the WebSphere Application Server.

To create a policy domain for WebSphere

  1. From the Policy Manager, click Create Policy Domains.

  2. Click the General tab and enter and save the information for your organization. For example:

    • Name: WebSphere

    • Description: Policy Domain Used for WebSphere

    • Enabled: Yes

    • Update Cache

  3. Click the Resources tab, then enter and save the following information for your organization. For example:

    • Resource Type: WebSphere Authentication Scheme

      This is the resource you defined earlier. If you changed the name of the WebSphere resource type, ensure that you specify it here.

    • URL Prefix: /Authen/Basic

    • Description: NetPointWASRegistry uses this resource for authenticating users in the Access System. Do not delete this resource.

  4. Click the Default Rules tab, Authentication Rules, Add to create and save a default authentication rule using the WebSphere Basic Authentication Scheme that you defined earlier.

    • Name: WebSphere

    • Description: Default authentication rule using the WebSphere Basic Authentication Scheme.

    • Authentication Scheme: Basic Over LDAP type

    You must create a Basic Over LDAP authentication scheme. The Access Manager SDK uses only this type of authentication scheme. You can create a new authentication scheme with a different name for WebSphere, but the authentication scheme type must be Basic Over LDAP.

  5. Click the Authorization Rules tab, then create and save an authorization rule to allow access to WebSphere resources. For example:

    1. Click General, then enter and save:

      • Name: Allow Everyone.

      • Description: Allow access to WebSphere resources.

      • Enabled: Yes

      • Allow takes Precedence: Yes

      By default, nobody is allowed. Changing the default to Allow Everyone enables the Access Server to check a user's identification for authentication.

    2. Click Actions (Authorization Success), then enter and save:

      • Return Type: WAS_REGISTRY

      • Name: uid

        This is a hard-coded value. Use this exact string.

      • Return Attribute: login attribute.

        This attribute must be the same as the attribute configured for the login semantic type in the Identity Server or a unique attribute in the user's profile, such as uid.

    3. Click Allow Access, then enter and save:

      • Role: Anyone

  6. Click OK to create the new policy domain.

You can now install the Connector for WebSphere.

11.5.5 Defining a Policy Domain for the WebSphere v6.0 Administration Console

For Websphere 6.0, you must use the Access System to create a policy domain for the WebSphere administration Console. This domain protects the console URLs in the ibm/console and /admin folders, and it is required when TAI is enabled for the WebSphere AppServer. The domain helps set the TAI cookie required by the TAI component, and it also redirects the access URL to the application server Administration Console (port 9060). Under these conditions, you must also set an Authorization Success URL

To create a policy domain for the WebSphere Administration Console

  1. Navigate to Policy Manager, Create Policy Domains, General.

  2. Enter and save the following information for your organization.

    For example:

    • Name: Protect WebSphere Admin Console

    • Description: Policy Domain Used for the WebSphere Administration Console URL

  3. Click the Resources tab, then enter and save the following information for your organization

    For example:

    • Resource Type: http

    • Host Identifier: The host identifier defined for the machine hosting the Web server.

    • URL Prefix: /admin and ibm/console

    • Description: Used by NetPointWASRegistry TAI component.

  4. Click the Authorization Rules tab, then create and save an authorization rule to allow access to WebSphere Admin Console resources

    For example:

    1. Click General, then enter and save:

      • Name: Allow Administrator.

      • Description: Allow access to WebSphere Admin Console resources.

      • Enabled: Yes

      • Allow takes Precedence: Yes

      By default, nobody is allowed. Changing the default to only Administrator User enables the Access Server to check a user's identification for authentication.

    2. Click Actions (Authorization Success), then enter and save the following:

      • Redirect to: http://hostname:9060/ibm/console

        If the Client Cert Authentication Scheme is to be used, set the associated variables as:

      • Redirect to: https://hostname:9043/ibm/console

        Where hostname is the fully qualified domain name of the machine hosting the WebSphere AppServer.

    3. Click Allow Access

      • Select the User who has Administrative rights, then click Save.

  5. To create a default authentication rule using the desired authentication scheme, (Basic Over LDAP, Form-based, Client Cert), navigate to Default Rules, then click Authentication Rules, then click Add. Enter and save the following values:

    • Name: WebSphere Default Scheme

    • Description: Default authentication rule for Admin Console.

    • Authentication Scheme:

    Create this scheme as a Basic Over LDAP, Form-based, or Client Cert authentication scheme.

  6. To create an authorization expression using the "Allow Administrator" authorization rule created previously, navigate to Default Rules, Authorization Expression, Add, then click Select Authorization Rule - "Allow Administrator". Next, click Add and Save

  7. Install the Connector for WebSphere.

  8. After you install and set up the connector and have also enabled TAI, enable the policy by completing the following steps:

    1. Navigate to General, Modify.

    2. Set Enable to YES, then click Save.

    At this point, you can access the WebSphere Administration Console through either of the following URLs:

    http://WebServerFQDN:port/admin

    http://WebServerFQDN:port/ibm/console

    Where WebServerFQDN is the fully qualified domain name of the machine hosting Web server and port is the port number used by the Web server.

11.6 Installing the Connector for WebSphere

After completing the prerequisites described in the previous sections, you are ready to install the Connector for WebSphere, as follows.

Caution:

If you plan to include the WebSphere Portal Server in your integration, you must install and configure the portal before you install the Connector for WebSphere. See "Preparing Your Environment".

Tip:

For information on upgrading this integration, see the Oracle Access Manager Upgrade Guide.

Task overview: Installing the Connector

  1. Run the installer, as described in "Launching the Installation".

  2. Create an installation directory, as described in "Defining the Installation Directory".

  3. Configure the Connector, as described in "Specifying Connector Details".

  4. Configure the WebGate, as described in "Completing Details for the WebGate"

  5. Configure the AccessGate, as described in "Specifying AccessGate Details".

  6. Install a certificate, as described in "Installing a Certificate"

  7. Configure WebPass, as described in "Configuring Multiple WebPass Instances for the Connector".

11.6.1 Launching the Installation

The initial installation and setup procedure differs depending on the platform on which you are installing Oracle Access Manager.

To launch installation

  1. Insert the installation CD.

    The DemoShield launches.

  2. Launch the program according to your platform:

    Windows: Navigate to Install Oracle Access Manager, Access System, Connector for WebSphere.

    Unix: Complete these steps:

    • Navigate to /Software/Solaris/AccessSystem/Connector for WebSphere.

    • Execute /COREidx.x_EN_sparc-s2_Connector_for_WebSphere.

    The install wizard launches.

11.6.2 Defining the Installation Directory

In this sequence, you will accept the terms of the license agreement and identify the installation directory for the Connector for WebSphere.

You need to specify the installation directory for the Connector for WebSphere on the machine where you installed WAS.

To define the installation directory

  1. Click Next to dismiss the Welcome Screen.

  2. Read and accept the terms of the license agreement, then click Next to continue.

  3. Respond to the next question based upon your platform. For example:

    • Windows: Click Next if you are logged in with administrator rights (otherwise click Cancel, log in as a user with administrator privileges, then restart the installation).

    • Unix: Specify the username and group, then click Next.

      Typically, the defaults are "nobody".

    You are asked to specify the installation directory for the Identity Server. When you do this and click Next, the installation will begin and you will not be able to return to restate the name.

  4. Accept the default directory by clicking Next (or change the destination, then click Next).

    For example:

    \Netpoint

    You are informed that the connector is being installed, which may take several seconds.

    The Configuration for Oracle Access Manager Connector for WebSphere screen appears.

11.6.3 Specifying Connector Details

You need to configure the WebPass for the Connector for WebSphere. For failover purposes, you can configure multiple WebPass instances during installation or through the NetPointWASRegistry.properties file.

To configure multiple WebPass instances during installation, when you enter the WebPass hostname and port number be sure to use a comma as a separator. The hostname must be fully qualified with the domain name. For example:

Hostname: foo.domain.com, bar.domain.com

Port Number: 80, 81

Where the valid WebPass host:port combinations are:

  • foo.domain.com:80

  • bar.domain.com:81

For details about configuring multiple WebPass instances through the properties file, see "NetPointWASRegistry.properties".

To specify Connector for WebSphere details

  1. Enter the information requested:

    • Hostname of WebPass: The fully qualified name of the machine on which WebPass is installed.

    • Port Number of WebPass: The port number for WebPass.

    • Is the Identity System (WebPass) protected by WebGate: Specify whether the Identity System (WebPass) is protected by a WebGate.

  2. Click Next.

    If the Identity System WebPass is protected by a WebGate, the WebGate configuration screen appears.

11.6.4 Completing Details for the WebGate

The following procedure describes how to provide WebGate configuration details.

Note:

If you have chosen to use WebGate to protect WebPass, the assumption is that you are protecting the Identity System applications with policy domains. It is also assumed that single sign-on between these components has been configured correctly.

To complete WebGate configuration details

  1. Enter the cookie domain for the WebGate (for example, .domain.com).

    The ObSSOCookie is then recognized by all servers within this domain.

  2. Enter the cookie path ( /).

  3. Click Next.

  4. Specify whether WebPass requires an HTTPS connection.

    This is the SSL for secure connection when WebPass runs on HTTPS.

  5. Specify the user attribute.

    This attribute must be the same as the attribute configured for the Login semantic type in the Identity Server or a unique attribute in the user's profile such as uid.

  6. Specify the user search attribute.

    The user attribute and the user search attribute cannot be the same.

    This attribute must be the same as the attribute configured for the DN Prefix semantic type for the person object class in the Identity Server. The person object class type must a structural object class. The administrator of your directory server sets this search attribute.

  7. Specify the group search attribute.

    This attribute must be the same as the attribute configured for the DN Prefix semantic type for the group object class in the Identity Server. The group object class a structural object class. The administrator of your directory server sets the group search attribute.

  8. You can select Yes to specify that you want the Connector for WebSphere's jar files to be copied from the Connector for WebSphere installation directory to the following directory:

    WAS_install_dir /classes

    Where WAS_install_dir is the directory where you installed WebSphere.

    For WebSphere 6.x and later versions, the classes folder is not present by default. Create the classes folder under the WAS_install_dir and click OK to copy the JAR files.

    If you select No, copy the jobaccess.jar and NetPointWASRegistry.jar files manually to the WAS_install_dir/classes after installation. Or, add the location of these jar files to the WebSphere runtime classpath.

  9. Be sure that .../classes folder path is mentioned in the WAS CLASSPATH in setupCMDline.sh script.

    This script is located in the folder WAS_INSTALL_DIR/bin.

    This enables the NetPointWASRegistry.jar files to be searched when WebSphere starts up.

  10. Click Next.

    The WebSphere Classes Directory screen appears.

11.6.5 Specifying AccessGate Details

As described in the following procedure, you specify the transport security mode for the AccessGate and other AccessGate details. See the Oracle Access Manager Access System Administration Guide for details on AccessGates.

To specify AccessGate details

  1. Select the same transport security mode that is specified for the Access Server

    The pages that you see next vary depending on the transport security mode that you selected. See the Oracle Access Manager Installation Guide for details.

  2. Click Next.

  3. Enter the following information for the AccessGate:

    • AccessGate ID: Enter the name you specified earlier when adding an AccessGate in the Access System Console.

    • Access Server ID: Enter the name of the Access Server you associated with this AccessGate.

    • Password for AccessGate: Enter the AccessGate password you specified earlier when adding an AccessGate in the Access System Console, if applicable.

      You can specify any Access Server that is associated with this AccessGate.

    • Hostname where Access Server is installed: Enter the fully qualified hostname for the Access Server you associated with this AccessGate; for example, stontium.oblix.com.

    • Port Number Access Server Listens To: Enter the port of the Access Server you associated with this AccessGate.

    • Global NetPoint Access Protocol Pass Phrase: Enter a pass phrase for all Oracle Access Manager components such as Access Server and WebGate.

      This field appears only if you specify Simple Mode or Cert Mode.

    • Global NetPoint Access Protocol Pass Phrase Confirmation: Reenter the pass phrase to confirm it.

  4. Click Next.

    A new AccessGate Configuration screen appears only if you specify Simple Mode or Cert Mode.

    • If you need a certificate for transport security, select Request for Certificate.

      The Access System sends out a request for a certificate.

    • If you already have a certificate, select Install Certificate to install it.

  5. Click Next.

    If you selected Install Certificate, the AccessGate Configuration screen reappears.

11.6.6 Installing a Certificate

You must provide the paths to the certificate, chain, and key files.

Note:

If the Installation fails unexpectedly or you need to change these settings later, you can run the configureAccessGate tool located in CWS_install_dir\oblix\tools\configureAccessGate, where CWS_install_dir is the directory where the Connector for WebSphere is installed.

To supply the paths to the certificate files

  1. Enter the full paths to the certificate, chain, and key files.

    The certificate consists of these files. If necessary, click Browse to navigate to the location of these files.

  2. Click Next to display the summary screen and then click Finish.

    The installation is complete.

    Next, if necessary, configure multiple WebPass instances for Connector for WebSphere.

11.6.7 Configuring Multiple WebPass Instances for the Connector

Oracle Access Manager uses failover to maximize performance and provide uninterrupted service to end users. Failover redirects requests when a server fails. You may want to configure multiple WebPass instances for failover purposes.

This section assumes that you have already installed more than one instance of WebPass. See the Oracle Access Manager Deployment Guide for more information on failover.

To configure multiple WebPass instances for the Connector for WebSphere

  1. Open the NetPointWASRegistry.properties file:

    CWS_install_dir/oblix/config/NetPointWASRegistry.properties

    where CWS_install_dir is the directory where you installed the Connector for WebSphere.

  2. Enter the fully qualified host name with the domain name and port number for the WebPass using a comma-separated list as follows:

    # IdentitySystem WebPass webserver host name and port number
    OB_WebPassHost=foo.domain.com,bar.doman.com
    OB_WebPassPort=81,80
    

    In this example, the valid WebPass host:port combinations are:

    • foo.domain.com:81

    • bar.domain.com:80

  3. Complete Connector setup as described next.

11.7 Completing Connector Setup

After installing the Connector for WebSphere, you must provide information about the Oracle Access Manager components that it communicates with, including the WebPass and Access Server.

Task overview: Completing Connector Setup

  1. Complete your setup of the Connector, as described in "Setting Up the Connector for WebSphere".

  2. Test the Connector environment, as described in "Testing Environment Setup".

11.7.1 Setting Up the Connector for WebSphere

In the following procedure, you ensure that the jar files added during installation appear in the proper location, or you add their location to the WebSphere classpath. You also ensure the environment variable path is correct. This is required because at run time, NetPointWASRegistry looks for the obaccess.dll file (Windows) or the libobaccess.so file (UNIX) that is located in the Oracle Access Manager installation directory.

To set up the Connector for WebSphere

  1. Ensure that the following jar files that you added during installation exist in the directory WAS_install_dir/classes or add the location of these jar files to the WebSphere classpath:

    • NetPointWASRegistry.jar

    • jobaccess.jar

  2. Add CWS_install_dir\oblix\lib to the environment variable path, as follows:

    Solaris: In the setupCmdLine.sh file, add as follows:

    CWS_install_dir\oblix\lib to $LD_LIBRARY_PATH

    where CWS_install_dir is the directory where you installed the Connector for WebSphere.

    Note:

    The NetPointWASRegistry may fail to install if it can not find the Access Manager SDK. You may need to add the following environment variables to the setupCmdLine.sh: OBACCESS_INSTALL_DIR=CWS_install_dir.

    AIX: In setupCmdLine.sh file, add as follows:

    CWS_install_dir\oblix\lib to $LIBPATH

    Restart the WebSphere Administration Server.

    Windows 2000: The installer automatically adds the information. However, you can:

    1. Manually add CWS_install_dir\oblix\lib to the PATH System variable.

    2. Reboot the machine.

    3. Start the WebSphere Administration Server.

  3. Check the configuration to ensure that WebGate is protecting the WebPass.

    From the Access System Console, click Access System Configuration, click AccessGate Configuration in the left navigation pane, click the link for the WebGate that protects the WebPass, and in the IPValidation field select the Off option.

    As of Oracle Access Manager 10.1.4, the WebGateStatic.lst file no longer exists. The options in this file have moved to the Access System Console. See Oracle Access Manager Access System Administration Guide for details.

  4. Restart the Web server.

  5. Verify the information in the NetPointWASRegistry.properties file located CWS_install_dir \oblix\config.

    where CWS_install_dir is the directory where your Connector for WebSphere is installed. The file is populated with information that was specified during installation. For more information, see "NetPointWASRegistry.properties".

  6. Determine if the machine hosting WebPass is running SSL, and if so, complete the following steps:

    1. Open the NetPointWASRegistry.properties file and set OB_WebPassSSLEnabled = True.

    2. Obtain the Web server and CA certificates of the Web server hosting WebPass or WebGate running in SSL mode and place them respectively in the server.cer file and the ca.cer file.

    3. Use keytool in JAVA_HOME\bin or JAVA_HOME\jre\bin to add the following ca and server certificates to jssecacert keystore:

      • keytool -import -alias ca -file ca.cer -keystore jssecacert

      • keytool -import -alias server -file server.cer -keystore jssecacert

    4. Depending on the Java version that you are using, copy this file to the security directory located in JAVA_HOME\lib\security, or in JAVA_HOME\jre\lib\security.

The Connector for WebSphere uses WebPass to make IdentityXML calls. You can specify only one WebPass at a time for the Connector for WebSphere. Typically, this will be on the same Web server that hosts the Policy Manager. If you have more than one WebPass, and want the Connector for WebSphere configured for a different WebPass, you can change the host machine and port in NetPointWASRegistry.properties file after installation.

If you edit the NetPointWASRegistry.properties file, you must restart the WebSphere Administration Server.

Note:

If WebPass is protected by a WebGate, ensure that the security level in this authentication scheme is the same level or a lower level than the one specified in the WebSphere authentication scheme discussed in "Defining an Authentication Scheme for WebSphere".

11.7.2 Testing Environment Setup

Before you enable the NetPointWASRegistry, you need to run the registryTester program to ensure that the NetPointWASRegistry is registered and can successfully connect to the Identity System.

The following procedure applies to all WAS versions.

Note:

On Linux systems, ensure that the LD_ASSUME_KERNEL environment variable is set to 2.4.1.9, as follows:
LD_ASSUME_KERNEL=2.4.19
export LD_ASSUME_KERNEL

To run the registryTester program

  1. Edit the file registerTester.bat (Windows) or registryTester.sh (UNIX) in the CWS_install_dir/unsupported directory.

    where CWS_install_dir is the directory where you installed the Connector for WebSphere.

  2. Modify these two variables as follows:

    • INSTALL_DIR: Specify the path to the Connector for WebSphere.

    • WAS_INSTALL_DIR: Specify the path to the WAS.

  3. Specify the correct classpath and comment out the unused classpath for your installation:

    • WebSphere 5.0 with Connector 7.0: Keep WebSphere classpath for v5.0; comment out irrelevant WebSphere classpaths.

    • WebSphere 5.0.2: Keep WebSphere classpath for v5.0.2; comment out irrelevant WebSphere classpaths.

    • WebSphere 5.1 with Connector 7.0.2: Keep the WebSphere classpath for v5.1; comment out irrelevant WebSphere classpaths.

    • WebSphere 6.0 with Connector 7.0.4: Keep the WebSphere classpath for v5.1; comment out irrelevant WebSphere classpaths.

  4. If you do not have a JAVA_HOME environment variable defined, set the JAVA_HOME parameter value as follows in the registryTester.bat or registryTester.sh file:

    Windows: %JAVA_HOME% = WAS_install_dir \java

    UNIX: $JAVA_HOME$ = WAS_install_dir /java

    where WAS_install_dir is the directory where you installed WebSphere.

  5. WebSphere 5.x only: Update the registryTester.sh (.bat on Windows) as follows:

    set CLASSPATH=.:${CLASSPATH}:${INSTALL_DIR}/oblix/lib/NetPointWASRegistry.jar:${INSTALL_DIR}/oblix/lib/jobaccess.jar:${WAS_INSTALL_DIR}/lib/xerces.jar:${WAS_INSTALL_DIR}/lib/j2ee.jar:${WAS_INSTALL_DIR}/lib/wssec.jar:${WAS_INSTALL_DIR}/java/jre/lib/ext/ibmjsse.jar
    

    Note:

    You may check the registryTester.bat for details.
  6. From the command line, run registryTester:

    • NT/W2K: registryTester.bat

    • UNIX: registryTester.sh

  7. Supply a Oracle Access Manager user ID and password when prompted.

  8. Verify the result:

    • If the program completes successfully, it connects to the Identity Server and returns a list of groups to which the user belongs.

    • If the registryTester program fails to connect with the Access Server or the Identity Server, check the parameter values in the NetPointWASRegistry.properties file and correct them as needed.

11.8 Configuring WebSphere Application Server v5

The following sections describe the integration of Oracle Access Manager with the WebSphere Application Server v5.0 or 5.1.

Before you begin, see "Supported Versions and Platforms" for complete details about version support.

Task overview: Integrating with WAS v5

  1. Enable the registry, as described in "Enabling the NetPointWASRegistry in WAS v5".

  2. Test the configuration, as described in "Testing the NetPointWASRegistry for WebSphere v5".

  3. Configure the TAI, as described in "Configuring the TAI for WebSphere v5".

11.8.1 Enabling the NetPointWASRegistry in WAS v5

Once you have installed the products and tested them to be sure they are communicating, you can enable the NetPointWASRegistry. Enabling the registry causes Oracle Access Manager to be used as the authentication source for the WebSphere Application Server.

The NetPointWASRegistry works with the User Registry in WebSphere 5.

Note:

In the following procedure, any Identity System user who is added to the role "Admin" must be in a group called "Admin" or "Administrator". Otherwise, this user may not able to login to WebSphere Administrative Console. Other roles, like "monitor" have no restrictions. Any Identity System user added to these roles in the WAS 5 Administrative Console can log in to the WAS 5 Administrative Console.

To enable the NetPointWASRegistry in WAS 5

  1. On Linux systems, ensure that the LD_ASSUME_KERNEL environment variable is set to 2.4.19 in the following location:

    WAS_install_dir/bin/setupCmdLine.sh
    

    Use the following command to set the environment variable:

    LD_ASSUME_KERNEL=2.4.19
    export LD_ASSUME_KERNEL
    
  2. Ensure that WebGate protecting the WebPass has IPValidation set to Off.

    From the Access System Console, click Access System Configuration, click AccessGate Configuration in the left navigation pane, click the link for the WebGate that protects the WebPass, and in the IPValidation field select the Off option.

  3. Create a backup copy of security.xml.

    In the following step, you will modify the configuration. You need to create a backup copy of security.xml before making a change to the configuration. If there are errors in the new configuration, you can always restore the previous version of the security.xml file.

  4. Copy the security.xml file located in the following directory:

    WAS_install_dir/config/cells/serverName

  5. Start the WebSphere Admin Service.

  6. Log in as the Identity Administrator into the WebSphere Administrative Console.

  7. Navigate to Security, User Registries, Custom Properties and enter the following:

    • Identity Administrator user ID

    • Server User Password

    • CustomRegistry Classname

    • Identity System Admin ID

    • User's password

    • Oracle Access Manager Classname: com.oblix.registry.NetPointWASRegistry

    Custom Properties page with input parameters .
  8. Under Additional Properties in the Configuration tab, click Custom Properties, click New, and enter the following:

    • Name: NetPointWASRegistry.properties

    • Value: C:\CWS_install_dir\oblix\config\NetPointWASRegistry.properties.

    • Description: Property file for Oracle Access Manager User Registry.

    • Select the Required checkbox, click OK, and save your changes.

    Custom Properties page.
  9. In the navigation pane on the left, click Authentication Mechanism, LTPA.

  10. In the Configuration tab, specify a password.

  11. Click OK.

  12. Navigate back to LTPA (in the navigation pane on the left, click Authentication Mechanism, LTPA) and do the following:

    • Click Single Signon (SSO).

    • Click the Enabled box.

    • Enter the domain name. For example, .oracle.com.

    • Click OK.

      LTPA page with values for single sign-on.
  13. In the navigation pane on the left, click Security, Global Security and change the following:

    1. Set the Active Authentication Mechanism to LTPA.

    2. Set the Active User Registry to Custom.

    3. Click OK.

    4. Click the Enabled box.

    5. Click Apply to test the configuration.

      If the information is correct, a message confirming the changes is displayed at the top. Correct any errors that are displayed.

    6. Click Save.

    7. Click Logout and close the browser window.

    8. Stop the WebSphere Application Service.

      If you get a message stating that the Service could not be stopped, switch to the Task Manager and ensure that there are no java processes running.

  14. Start the WebSphere Admin Service.

11.8.2 Testing the NetPointWASRegistry for WebSphere v5

Next, verify the NetPointWASRegistry is configured correctly.

To test the NetPointWASRegistry configuration

  1. Access the Snoop Servlet sample running on the default server at

    http://hostname:port/snoop

    or

    http://hostname:web_server_plug-in_port/snoop

  2. When challenged by WebSphere, enter a username and password that is valid in Oracle Access Manager.

    By default, any authenticated user should be allowed access.

  3. Launch the WebSphere Administrative Console and login as the user specified in Security, User Registries, Custom Properties.

    If the configuration is correct, you will be able to login successfully.

  4. Set access control for the WebSphere Administrative Console by specifying the users and groups and the roles to which they belong.

    See WebSphere 5 documentation for more information.

  5. Note the .xml files that are modified to support Admin Console access and click Save.

After you have installed Connector for WebSphere, you must configure the NetPointWASRegistry and TAI. The NetPointWASRegistry is used for authentication and the TAI enables single sign-on using Oracle Access Manager.

11.8.3 Configuring the TAI for WebSphere v5

You configure the TAI to enable single sign-on between Oracle Access Manager and WAS, as well as between Oracle Access Manager and the WebSphere Portal Server. For WebSphere 5.0 or 5.1, you must install webgate.properties, add the TAI, and then add custom properties.

Note:

On Linux systems, ensure that the LD_ASSUME_KERNEL environment variable is set to 2.4.19 in the corresponding WebServer startup script, as follows:
LD_ASSUME_KERNEL=2.4.19
    export LD_ASSUME_KERNEL

Tip:

For optional details, see "Implementation Notes for the TAI".

To install and configure TAI for WAS 5

  1. Copy the configuration file named webgate.properties (see Table 11-2 for parameters):

    From: CWS_install_dir /oblix/config

    To: WAS_install_dir /properties folder in the WebSphere installation properties directory.

    where CWS_install_dir is the directory where the Connector for WebSphere is installed, and WAS_install_dir is the directory where the WebSphere Application Server is installed.

    This file contains configuration information that WebSphere will use to connect to the AccessGate.

  2. In the WebSphere installation properties directory, modify the parameter values of the webgate.properties file (See Table 11-2) as follows:

    OB_InstallDir = CWS_install_dir

    where CWS_install_dir is the directory where the Connector for WebSphere is installed. For example:

    C:\COREid\NetPointWASRegistry
    

    If WebGate is installed on a proxy server that is used as a front end server to direct all user requests to Web servers that interface with WebSphere Application Servers, then specify the following parameter values:

    • OB_IsProxyEnabled=true

    • OB_hostnames = serverName

      where serverName is the name of the proxy server.

    • OB_ports = portNumber

      where portNumber is the port number of the proxy server.

      Note:

      If you used a resource other than Authen, you must specify the resource name in the webgate.properties file.
  3. Launch the WebSphere Administrative Console.

  4. In the navigation pane on the left, click Authentication Mechanisms, LTPA.

  5. Under Additional Properties, click Trust Association, Interceptors, New.

  6. In the Name field, enter Oracle TAI Interceptor.

  7. In the Interceptor classname field, enter com.oblix.tai.was5.WebGateTrustAssociationInterceptor.

    Page after clicking Interceptors.
  8. Click OK.

  9. Add the following three properties:

    1. Name: com.ibm.websphere.security.trustassociation.types

      • Value: webgate

      • Description: TAI property

      • Select the Required checkbox.

      • Click OK.

    2. Name: com.ibm.websphere.security.trustassociation.webgate.config

      • Value: webgate

      • Description: Name of the TAI properties file located in WAS_install_dir/properties directory.

      • Select the Required checkbox.

      • Click OK.

    3. Name: com.ibm.websphere.security.trustassociation.webgate.interceptor

      • Value: com.oblix.tai.was5.WebGateTrustAssociationInterceptor

      • Description: TAI class for WebSphere 5

      • Select the Required checkbox.

      • Click OK.

        Custom properties page.
  10. Click Interceptors at the top of the page and then click Save.

  11. Navigate to:

    WAS_install_dir /config/cells/serverName_dir

    where serverName_dir is the directory where the server is installed.

  12. Make a backup copy of the security.xml file.

  13. In the WebSphere Administrative Console, navigate to LTPA, Trust Association, Interceptors.

  14. Select the WebSeal Interceptor and click Delete.

  15. Click Trust Association and click the Enabled check box.

  16. Click Apply and then click Save.

  17. Logout of the WebSphere Administrative Console and close the browser.

  18. Shut down the Websphere Admin Server.

    If you get an error message, go to Task Manager and ensure that the java process is not running.

  19. Restart the WebSphere Admin Service.

    If the Service does not start, verify that the properties are set correctly in the security.xml file and that the webgate.properties file is in the correct location.

  20. Create an Access System policy to protect WebSphere resources

    In the Policy Manager, define a policy for the resource that you want to protect.

    Other authorization rules can also be added at this point. The policy that you use to protect the URL can use basic, form, cert, or other authentication schemes that the Access System supports.

    Ensure that the security level in this authentication scheme is equal or greater than the one specified in the WebSphere authentication scheme discussed in "Preparing Your Environment".

    See the Oracle Access Manager Access System Administration Guide for more information on defining policies.

  21. Verify that the TAI is working as detailed in the following section.

11.8.3.1 Testing the TAI for WAS v5

After you have configured TAI, restart WAS and test for successful authentication and single sign-on between WebSphere and Oracle Access Manager.

To conduct these tests, you use the Snoop servlet that WebSphere provides. The Snoop servlet has security constraints that only allow access to authenticated users. When WebSphere security is not enabled, access to the Snoop is unrestricted. When WebSphere security and TAI are enabled, users attempting to access Snoop will be challenged by the Access System. If TAI is not enabled, users attempting to access Snoop will be challenged by WebSphere.

To test Access System single sign-on for WAS, you must build and configure a new WebSphere secure application. Then, test Access System authentication and single sign-on for the secured application.

During installation, a secure application is built that you can use for testing and stored in the following location:

CWS_install_dir/examples/securityapp/SimpleSessionSecure.ear

where CWS_install_dir is the directory where you installed the Connector.

Note:

If you wish, you can build your own secure application. The following procedure describes how to build an application for WAS 5.x.

To build a WebSphere secure application

  1. Build a secure application named SimpleSessionSecure according to the instructions available at the following URL:

    http://www-3.ibm.com/software/webservers/appserv/doc/v40/ae/ infocenter/was/060704_security.html

  2. Save the SimpleSessionSecure.ear file in the appropriate location; for example, in c:\temp.

  3. Verify that the WAS Administration Server is running.

To install the SimpleSessionSecure application

  1. Launch the WebSphere Administrative Console located in WAS_install_dir \bin\adminclient.

    where WAS_install_dir is the directory where the WebSphere Application Server is installed.

  2. In the WebSphere Console tree view, right-click WebSphere Administrative Domain, Enterprise Applications.

  3. From the resulting menu, click Install Enterprise Application to launch the Install Enterprise Application wizard.

    The Specifying the Application or Module panel appears.

  4. Verify the following settings:

    • The Browse for file on node field is set to your current node.

    • The Install Application option is selected.

  5. Click Browse to locate and select the SimpleSessionSecure.ear file.

  6. Verify that its name is now displayed in the Path field and specify SimpleSessionSecure as the Application name.

  7. Click Next, then click Yes when prompted whether to deny access to unprotected methods.

  8. In the Mapping Users to Roles panel, verify that the Goodguys role is mapped to valid Identity System Users.

  9. Click Select; verify that Identity System Users are listed in the Selected Users/Groups area of the resulting Select Users/Groups dialog, then click OK to close the dialog after verification.

  10. Click Next.

  11. On the Mapping EJB RunAs Roles to Users panel, click Next.

  12. In the Binding Enterprise Beans to JNDI Names panel, verify that the JNDI Name is set to gs/hello, and then click Next.

  13. In the Mapping EJB References to Enterprise Beans panel, verify that the JNDI Name is set to gs/hello, and then click Next.

  14. Click Next in the next three panels, until the Selecting Virtual Hosts for Web Modules panel appears.

  15. In the Selecting Virtual Hosts for Web Modules panel, ensure that the Virtual Host is set to default_host, then click Next.

  16. In the Selecting Application Server panel, ensure that the EJB11 and SimpleSessionWar modules reside on Application Server named Default Server and then click Next.

  17. In the Completing the Application Installation Wizard panel, click Finish.

  18. When prompted to regenerate code, click No.

  19. Look for the message confirming successful installation of the application

    It may be a minute before it is displayed. You can now view the SimpleSessionSecure application in the WebSphere Administrative Console tree view.

  20. After you build the SimpleSessionSecure application, regenerate the plug-in configuration to enable the Web server to locate the WebSphere application.

To regenerate the plug-in configuration

  1. In the console tree view, right-click WebSphere Administrative Domain, Nodes, hostname.

    Where hostname is the name of the machine where WebSphere is installed.

  2. From the resulting menu, select Regen Webserver Plugin.

  3. In the Event Message panel, a message appears stating that the plug-in regeneration has been completed.

  4. Stop the WebSphere Administrative Server and start it again:

    To stop the administrative server, under Nodes in the WebSphere Administrative Console, right-click hostname and select Restart from the resulting menu. The console will close.

  5. Open the WebSphere Administrative Console again after the administrative server starts.

    This time, you will be asked to log in, because security is enabled.

  6. In the WebSphere Administrative Console tree view, click WebSphere Administrative Domain, Nodes, hostname, Application Servers, Default Server.

    Where hostname is the fully qualified name of the machine where WebSphere is installed; for example, xyz.domain.com.

  7. Ensure that the Module Visibility setting of the Default Server is set to Compatibility.

  8. If you want to change the visibility setting, click Apply.

To test Access System authentication and single sign-on

  1. Access the SimpleSessionSecure application at the following URL:

    http://hostname/gettingstarted3/SimpleSession?msg=Hi

    where hostname is the fully qualified name of the machine where WebSphere is installed; for example, xyz.domain.com.

  2. Log in as a Oracle Access Manager user.

    • TAI Not Enabled: If you have not enabled the TAI, you will be challenged by WebSphere and your credentials are passed on to the Access System. After the Access System authenticates you, you will be allowed to access SimpleSessionSecure.

    • TAI Enabled: If you have enabled TAI, you will be challenged and authenticated by the Access System. Because single sign-on between the Access System and WAS is enabled, you are allowed to access SimpleSessionSecure and other Access System-protected resources (URLs) without being challenged by WebSphere.

To test single sign-on for Access System-protected WebSphere resources

  1. On the Web server you use to access the WAS, navigate to the document root and create a directory named test.

  2. In the test directory, create a file named index.html.

  3. In the Access System, create and enable policies to protect /servlet and /test directories.

  4. Access the Snoop servlet at the following URL:

    http://hostname.domain.com:9080/servlet/snoop

    where hostname is the fully qualified name of the machine where WebSphere is installed; for example, xyz.domain.com.

    You will be challenged for authentication. After you are authenticated, you will be allowed to access the Snoop servlet.

  5. Access the /test URL.

    You must be allowed to access the URL and view the index.html file without being challenged.

11.8.3.2 Enabling Logging for TAI for WAS v5

You can enable logging for the TAI from the WebSphere Administrative Console. The procedure to enable logging varies depending on the WAS version that you use.

To enable logging for TAI for WAS 5

  1. Launch the WebSphere Administrative Console.

  2. Navigate to Troubleshooting, Logs and Trace

  3. Select your Server.

  4. Select Diagnostic Trace.

  5. Modify the Trace specification.

  6. Select the Components tab.

  7. Enable debug logging for com.oblix.tai.was5.WebGateTrustAssociationInterceptor.

  8. Integrate Oracle Access Manager with the WAS Portal v5, if desired.

11.9 Configuring the WebSphere Application Server v6

The following sections describe how you integrate Oracle Access Manager with the WebSphere Application Server v6:

11.9.1 Supported Versions and Platforms

You can find support and certification information at the following URL:

http://www.oracle.com/technology/documentation/

You must register with OTN to view this information.

Also, you can see the supported versions and platforms for this integration on Metalink, as follows.

To view information on Metalink

  1. In your browser, enter the following URL:

    https://metalink.oracle.com

  2. Log in to MetaLink.

  3. Click the Certify tab.

  4. Click View Certifications by Product.

  5. Select the Application Server option and click Submit.

  6. Choose Oracle Identity Manager and click Submit.

  7. Click Oracle Identity Management Certification Information 10g (10.1.4.0.1) (html) to display the Oracle Identity Management page.

  8. Click the link for Section 6, Oracle Access Manager Certification to display the certification matrix.

11.9.2 Enabling the NetPointWASRegistry for WAS 6 and 6.1

After you have installed WAS 6 or 6.1 and the Connector for Websphere, then tested them to be sure they are communicating, you can enable the NetPointWASRegistry, which interoperates with the User Registry in WebSphere 6 and 6.1. This enables Oracle Access Manager to act as the authentication source for the WebSphere Application Server.

Notes:

The procedures for WAS 6 and 6.1 are slightly different.

In the following procedures, any Oracle Access Manager user who is added to the role "Admin" must belong to the group named "Admin" or "Administrator." Otherwise, this user may not able to log in to WebSphere Administrative Console. Other roles, such as "Monitor" have no restrictions. Any Oracle Access Manager user added to these roles through the WAS 6 or 6.1 Administrative Console can log in to the WAS 6 or 6.1 Administrative Console.

To enable the NetPointWASRegistry in WAS 6

  1. Ensure that WebGate protecting the WebPass has IPValidation set to Off.

    From the Access System Console, click Access System Configuration, click AccessGate Configuration in the left navigation pane, click the link for the WebGate that protects the WebPass, and in the IPValidation field select the Off option.

  2. Make a backup copy of the security.xml file located in the following directory:

    WPS_install_dir/profiles/default/config/cells/serverNodeName

    Create a backup copy of security.xml whenever you make a change to the configuration. If you make errors in the new configuration, you can restore from backup.

  3. Start the WebSphere Admin Service.

  4. Log in to the WebSphere Administration Console as the WebSphere administrator.

    The Administrative Console for WAS 6 is accessible through the following URL:

    http://hostname.domain.com:9060/ibm/console

    where hostname is the fully qualified name of the machine where WebSphere is installed; for example, xyz.domain.com.

  5. In the left navigation pane, click Security, then click Global Security, and do the following:

    • Uncheck the Enable Global Security checkbox, click Apply, click Save, then log out an close the browser window.

    • Stop the WebSphere Application Service.

      If a message announces that Service could not be stopped, switch to the Task Manager and ensure that no Java processes are currently running.

    • Restart WebSphere and log in to the WebSphere Administration Console as the Identity administrator.

  6. Navigate to Security, Global Security, Custom and enter values for the following variables:

    • Server user ID

    • Server User Password

    • CustomRegistry Classname

    • Oracle Access Manager Admin ID

    • User password

    • Oracle Access Manager Classname: com.oblix.registry.NetPointWASRegistry

  7. Navigate to Configuration, Additional Properties, Custom Properties, New.

    Enter values for the following parameters:

    • Name: NetPointWASRegistry.properties

    • Value: /opt/netpoint/oblix/config/NetPointWASRegistry.properties

    • Description: Property file for User Registry

  8. Click Apply.

  9. Navigate to Global Security, Authentication Mechanisms, LTPA.

  10. In the Configuration tab, specify a password, then click Apply.

  11. Click Single Signon (SSO).

    • Click the Enabled box.

    • Enter the domain name (for example, oracle.com)., then click Apply.

  12. In the left navigation pane, click Security, click Global Security, then complete the following steps:

    1. Set the Active Authentication Mechanism to LTPA.

    2. Set the Active User Registry to Custom User Registry, then click OK.

    3. Click the Enable Global Security box.

    4. Click Apply to test the configuration.

      If the information is valid, a message confirming the changes displays at the top. Otherwise, correct any errors that are reported.

    5. Click Save.

    6. Click Logout and close the browser window.

    7. Stop the WebSphere Application Service. If a message announces that Service could not be stopped, switch to the Task Manager and ensure that no Java processes are currently running.

  13. Start the WebSphere Administration Service.

To enable the NetPointWASRegistry in WAS 6.1

  1. Ensure that WebGate protecting the WebPass has IPValidation set to Off.

    From the Access System Console, click Access System Configuration, click AccessGate Configuration in the left navigation pane, click the link for the WebGate that protects the WebPass, and in the IPValidation field select the Off option.

  2. Make a backup copy of the security.xml file located in the following directory:

    WPS_install_dir/profiles/default/config/cells/serverNodeName

    Create a backup copy of security.xml whenever you make a change to the configuration. If you make errors in the new configuration, you can restore from backup.

  3. Start the WebSphere Admin Service.

  4. Log in to the WebSphere Administration Console as the Identity Administrator.

    The Administrative Console for WAS 6 is accessible through the following URL:

    http://hostname.domain.com:9060/ibm/console

    where hostname is the fully qualified name of the machine where WebSphere is installed; for example, xyz.domain.com.

  5. Navigate to Security, then to Secure administration, applications, and infrastructure, and in the Available realm definitions section select Standalone Custom Registry, click Configure, and enter the following under General Properties.

    • Primary administrative user name: Enter oam_administrator_ID, where the value is an Oracle Access Manager administrator ID.

    • Server user identity: Select the Automatically generated user identity option.

    • Custom registry class name: com.oblix.registry.NetPointWASRegistry

    • Check the Ignore Case for Authorization checkbox.

  6. Click Apply.

  7. Navigate to Additional Properties, Custom Properties, New, and enter values for the following parameters:

    • Name: NetPointWASRegistry.properties

    • Value: /opt/netpoint/oblix/config/NetPointWASRegistry.properties

      This is the full path to the NetPointWASRegistry.properties file.

    • Description: Property file for User Registry

  8. Click Apply.

  9. Navigate to Security, then to Secure Administration, applications, and infrastructure, then to Web Security.

    Click Single sign-on (SSO), and enter the following under General Properties:

    • Click the Enabled box.

    • Enter the domain name (for example, mycompany.com).

    Click Apply.

  10. Go to Security, then to Secure Administration, applications, and infrastructure, and do the following:

    1. Under Administrative Security, click the Enabled administrative security box.

    2. Under Application security, click the Enable application security box.

    3. In the Available Realm Definition list, select Standalone Custom Registry and click the Set As Current button.

    4. Click Apply to test the configuration.

      If the information is valid, a message confirming the changes displays at the top. Otherwise, correct any errors that are reported.

    5. Click Save.

    6. Click Logout and close the browser window.

    7. Stop the WebSphere Application Service.

      If a message announces that Service could not be stopped, switch to the Task Manager and ensure that no Java processes are currently running.

  11. Start the WebSphere Administration Service.

11.9.3 Testing the NetPointWASRegistry for WebSphere v6

After you have enabled the NetPointWASRegistry, you need to verify that it is configured correctly.

To test the NetPointWASRegistry configuration

  1. Access the Snoop Servlet sample running on the default server at the following URL:

    http://hostname:9080/snoop

    Where hostname is the fully qualified name of the machine where WebSphere is installed.

    Alternatively, you can use the following URL:

    http://hostname:web_server_plug-in_port/snoop

    Where hostname is the fully qualified domain name of the machine on which WebServer is installed.

  2. When challenged by WebSphere, enter a username and password that is valid in Oracle Access Manager.

    By default, any authenticated user should be allowed access.

  3. Launch the WebSphere Administrative Console and login as the user specified in Security, Global security, Custom.

    If the configuration is valid, the login will succeed.

  4. Set access control for the WebSphere Administrative Console by specifying the users and groups and the roles to which they belong.

    See WebSphere 6 documentation for details.

  5. Write down the names of the .xml files that you have modified to support Admin Console access, then click Save.

After you have installed Connector for WebSphere, you must configure the NetPointWASRegistry and TAI. The NetPointWASRegistry handles authentication, and the TAI facilitates Access System single sign-on.

11.9.4 Configuring the TAI for WebSphere 6 and 6.1

You configure the TAI to enable single sign-on between Oracle Access Manager and WAS. For WebSphere 6.0 or 6.1 you must install webgate.properties, add the TAI, and then add custom.properties.

Note:

The procedures for configuring the TAI are slightly different for WAS 6 and 6.1.

To install and configure TAI for WebSphere v6

  1. Copy the configuration file webgate.properties from the following directory:

    CWS_install_dir/oblix/config

    where CWS_install_dir is the directory where the Connector for WebSphere is installed, to the WebSphere installation properties directory, which resides in the following location:

    WAS_install_dir/properties

    where WAS_install_dir is the directory where the WebSphere Application Server is installed.

    Webgate.properties contains configuration information that WebSphere will use to connect to the AccessGate.

  2. In the WebSphere installation properties directory, modify the parameter values in the webgate.properties file as follows:

    OB_InstallDir = CWS_install_dir

    where CWS_install_dir is the directory where the Connector for WebSphere is installed.

    If the associated WebGate is installed on a proxy server used as a front end server to direct all user requests to Web servers that interface with WebSphere Application Servers, then specify the following parameter values:

    • OB_IsProxyEnabled=true

    • OB_hostnames = serverName

      where serverName is the name of the proxy server.

    • OB_ports = portNumber

      where portNumber is the port number of the proxy server.

      Note:

      If you used a resource other than Authen, you must specify the resourcename in the webgate.properties file.
  3. Launch the WebSphere Administrative Console.

  4. In the navigation pane on the left, navigate to Global security, Select Authentication Mechanisms, LTPA, Trust Association, Additional Properties, Interceptors, New.

  5. In the Interceptor classname field, enter com.oblix.tai.was5.WebGateTrustAssociationInterceptor, then click Apply.

  6. Navigate to Additional Properties, then to Custom Properties, then to New.

  7. Make the following changes:

    1. Name: com.ibm.websphere.security.trustassociation.types

      • Value: webgate

      • Description: TAI property

      Click OK.

    2. Name: com.ibm.websphere.security.trustassociation. webgate.config

      • Value: webgate

      • Description: Name of the TAI properties file located in WAS_install_dir/properties directory.

      Click OK.

    3. Name: com.ibm.websphere.security.trustassociation. webgate.interceptor

      • Value: com.oblix.tai.was5. WebGateTrustAssociationInterceptor

      • Description: TAI class for WebSphere 6

      Click OK.

  8. Click Interceptors at the top of the page and then click Save.

  9. Navigate to the following:

    WAS_install_dir/profiles/default/config/cells/serverNodeName

  10. Make a backup copy of the security.xml file.

  11. In the WebSphere Administrative Console, navigate to LTPA, Trust Association, Interceptors.

  12. Select the WebSeal Interceptor, then click Delete.

  13. Click Trust Association, then click the Enable Trust Association check box.

  14. Click Apply, then click Save.

  15. Logout of the WebSphere Administrative Console, then close the browser.

  16. Shut down the Websphere Admin Server.

    If you get an error message, go to Task Manager and ensure that no Java process is running.

  17. Restart the WebSphere Admin Service.

    If the Service does not start, verify that the properties are set correctly in the security.xml file and that the webgate.properties file is in the correct location.

  18. Create an Access System policy to protect WebSphere resources as described in "To install and configure TAI for WAS 5".

    To facilitate access the Administration Console after you have enabled TAI, you need to enable the Policy created in "Defining a Policy Domain for WebSphere". You also need to enable the policy created in "Defining a Policy Domain for the WebSphere v6.0 Administration Console".

  19. Verify that the TAI is working, as detailed in "Testing the TAI for WAS 6 and 6.1".

To install and configure TAI for WAS 6.1

  1. Copy the configuration file webgate.properties from the following directory:

    CWS_install_dir/oblix/config

    where CWS_install_dir is the directory where the Connector for WebSphere is installed, to the WebSphere installation properties directory, which resides in the following location:

    WAS_install_dir/properties

    where WAS_install_dir is the directory where the WebSphere Application Server is installed.

    Webgate.properties contains configuration information that WebSphere will use to connect to the AccessGate.

  2. In the WebSphere installation properties directory, modify the parameter values in the webgate.properties file as follows:

    OB_InstallDir = CWS_install_dir

    where CWS_install_dir is the directory where the Connector for WebSphere is installed.

    If the associated WebGate is installed on a proxy server used as a front end server to direct all user requests to Web servers that interface with WebSphere Application Servers, then specify the following parameter values:

    • OB_IsProxyEnabled=true

    • OB_hostnames = serverName

      where serverName is the name of the proxy server.

    • OB_ports = portNumber

      where portNumber is the port number of the proxy server.

      Note:

      If you used a resource other than Authen, you must specify the resourcename in the webgate.properties file.
  3. Launch the WebSphere Administrative Console.

  4. Go to Security, then to Secure Administration, applications, and infrastructure, then to Web Security.

    Click Trust Association, then click Additional Properties, then click Interceptors, then click New.

  5. In the Interceptor classname field, enter com.oblix.tai.was5.WebGateTrustAssociationInterceptor, then click OK.

  6. Click com.oblix.tai.was5.WebGateTrustAssociationInterceptor, then click Additional Properties – Custom Properties, then click New.

  7. Add the following custom properties:

    1. Name: com.ibm.websphere.security.trustassociation.types

      • Value: webgate

      • Description: TAI property

      Click OK.

    2. Name: com.ibm.websphere.security.trustassociation. webgate.config

      • Value: webgate

      • Description: Name of the TAI properties file located in WAS_install_dir/properties directory.

      Click OK.

    3. Name: com.ibm.websphere.security.trustassociation. webgate.interceptor

      • Value: com.oblix.tai.was5. WebGateTrustAssociationInterceptor

      • Description: TAI class for WebSphere 6

      Click OK.

  8. Click Interceptors at the top of the page and then click Save.

  9. Navigate to the following:

    WAS_install_dir/profiles/default/config/cells/serverNodeName

  10. Make a backup copy of the security.xml file.

  11. Go to Security, then to Secure Administration, applications, and infrastructure, then to Web security.

    Click Trust Association, then click Additional Properties, then click Interceptors.

  12. Delete the following Interceptors:

    • com.ibm.ws.security.spnego.TrustAssociationInterceptorImpl

    • com.ibm.ws.security.web.TAMTrustAssociationInterceptorPlus

    • com.ibm.ws.security.web.WebSealTrustAssociationInterceptor

    • com.ibm.ws.sip.security.digest.DigestTAI

  13. Click Trust Association, then click the Enable Trust Association check box.

  14. Click Apply, then click Save.

  15. Logout of the WebSphere Administrative Console, then close the browser.

  16. Shut down the Websphere Admin Server.

    If you get an error message, go to Task Manager and ensure that no Java process is running.

  17. Restart the WebSphere Admin Service.

    If the Service does not start, verify that the properties are set correctly in the security.xml file and that the webgate.properties file is in the correct location.

  18. Create an Access System policy to protect WebSphere resources as described in "To install and configure TAI for WAS 5".

    To facilitate access the Administration Console after you have enabled TAI, you need to enable the Policy created in "Defining a Policy Domain for WebSphere". You also need to enable the policy created in "Defining a Policy Domain for the WebSphere v6.0 Administration Console".

  19. Verify that the TAI is working, as detailed in "Testing the TAI for WAS 6 and 6.1".

11.9.5 Testing the TAI for WAS 6 and 6.1

The following procedure describes testing the TAI for WAS 6 and 6.1.

To test the TAI

After you have configured TAI, test for successful authentication and single sign-on between WebSphere and Oracle Access Manager.

To conduct these tests, use the Snoop servlet that WebSphere provides. The Snoop servlet has security constraints that only allow access to authenticated users.

When WebSphere security is not enabled, access to the Snoop is unrestricted.

When WebSphere security and TAI are enabled, users attempting to access Snoop will be challenged by the Access System. If TAI is not enabled, users attempting to access Snoop will be challenged by WebSphere as well.

To test single sign-on for Access System-protected WebSphere resources

  1. On the Web server you use to access the WAS, navigate to the document root and create a directory named test.

  2. In the test directory, create a file named index.html.

  3. In the Access System, create and enable policies to protect the /snoop and /test directories.

  4. Access the Snoop servlet through the following URL:

    http://hostname.domain.com:80/snoop

    where hostname is the fully qualified name of the machine where the Web server is installed.

    You will be challenged for authentication. After you are authenticated, you will be allowed to access the Snoop servlet.

  5. Access the /test URL.

    Verify that you can access the URL and view the index.html file without being challenged.

11.9.6 Enabling Logging for TAI for WAS 6 and 6.1

You can enable logging for TAI from the WebSphere Administrative Console.

To enable logging for TAI for WAS 6 and 6.1

  1. Launch the WebSphere Administrative Console.

  2. Navigate to Troubleshooting, Logs and Trace

  3. Select your Server.

  4. Select Change Log Level Details.

  5. Select Components.

  6. Enable debug logging for com.oblix.tai.was5.WebGateTrustAssociationInterceptor

11.10 Integrating with WebSphere Portal

A portal provides a single point of access to enterprise data and applications, presenting a unified and personalized view of that information to employees, customers, and business partners.

The WebSphere Portal Server runs on top of the WAS and uses the WAS security infrastructure to enforce access control. Integrating Oracle Access Manager with the WebSphere Portal provides the following Oracle Access Manager functionality for the portal:

The WebSphere Portal V5 uses the following component to manage user and group information.

Member Manager: Member Manager presents a Java object view of Users and Groups to WebSphere Portal, including all portlets installed on WebSphere Portal. Member Manager (as accessed through PUMA) is the abstraction interface that WebSphere Portal V5.0 uses to access user and group information. This includes the user accounts, which tell Portal that the user exists, any user groups within which the user might be a member, and attributes about the users.

The following figure shows the architecture of the Member Manager.

Communication flow diagram.

See the WebSphere Portal v5 documentation for more information on the portal and related components.

Oracle Access Manager Custom Member Repository: The Custom Member Repository (CMR) is available with the Connector for WebSphere, as described in "Supported Versions and Platforms". The CMR is an instance of a Member Manager component that connects the WebSphere Portal Server to the Identity System users and groups.

The CMR is a custom user data store that implements the IBM WebSphere MemberRepository interface. As shown in Figure 11-4, the CMR stores user and group base attributes in user data store. The CMR is used by the WebSphere Portal Server to make queries like getAttributes for a user for personalization, getGroupMemberships, search users by attribute, and similar functions. User profile information is in the Portal database and authentication information is available through the Administration Console and LDAP.

Figure 11-4 Member Manager, WebSphere Portal Database, and the CMR

Member Manager connecting to portal database and CMR.

Note:

Group MemberShip functionality is not currently supported. As a result, with Nested Groups, if you check for inner group membership it won't display its parent group details.

The CMR supports only read operations, not create, modify, or delete operations. The CMR is an extension of the custom user registry (CUR) and requires the Portal Server.

The configuration files used to control WebSphere Portal Member Manager come into play with the CMR are explained in the following paragraphs. These files are usually created during the portal installation:

wmm.xml: Top level Member Manager configuration. Lists and configures the various MemberRepository implementations used by Member Manager. Most other Member Manager configuration files are pointed to from this file. The CMR details should be configured in this file.

PumaService.properties: This is the configuration file for the PUMA API, which in WebSphere Portal V5.0.x is a mapping layer between WebSphere Portal and Member Manager. This is not a Member Manager configuration file, but because PUMA is part of the "user stack" in Portal, this configuration file is important.

This file includes a comma-separated list of attribute names that will be passed to Member Manager requests and several multi-valued properties. This file may need to be configured for the user attributes for personalization. All user.base.attributes and group.base.attributes values will be searchable in the CMR. For example:

user.base.attributes=cn,uid,cn,logonId,logonPasswordVerify,logonPassword ...
 group.base.attributes=cn,uniqueOwnerIdentifier,membergroups, 
 groupmembers,memberGroupName,memberGroupType,distinguishedName

All other attributes go to the Portal database.

During startup, only the attributes identified in the user.minimum.attributes parameter are retrieved. For example:

user.minimum.attributes=cn,genUserid,cn,givenName,sn,mail

Note:

All attributes in the user.minimum.attributes list must have correct attribute access control set in the User Manager and Group Manager for the Administrator, and all need to be in one of the User Manager configuration panels. For example, if the Portal Server needs the givenName attribute, one of the Identity System panels needs First Name. In the Identity System, the givenName attribute is mapped to Display Name, First Name.

To see the LDAP to Oracle Access Manager mapping, you can select the desired attribute and view the corresponding Display Name in the Identity System Console, User Manager Configuration, Configure Tab, Link, Modify Attributes page.

See the Oracle Access Manager Identity and Common Administration Guide for details.

wpconfig.properties: This is WebSphere Portal configuration file. The portal user/group administrator details needs to be set in this file. This file is present in WPS_install_dir/config folder, where WPS_install_dir is the Portal Server home directory.

VaultService.properties: This file is located in WPS_install_dir /shared/app/config/services folder. This configuration file is used to specify Vault Adapter Implementations. You have to set correct system admin credential DN in this file.

11.10.1 About Integration with the CMR

During login, the user is authenticated as depicted in "Scenario 1: Use of NetPointWASRegistry".

Without the Oracle Access Manager CMR, the WebSphere Portal Server must communicate directly with the LDAP directory server to obtain user, group, and personalization information. With the CMR, communication between the WebSphere Portal Server and the directory server can be eliminated. The CMR performs read operations through the NetPointWASRegistry with the directory server.

Figure 11-5 shows the interaction between the WebSphere Portal Server, CMR, and LDAP directory server during the login authorization process. This follows processes described in "Scenario 1: Use of NetPointWASRegistry".

Figure 11-5 WebSphere Portal Server and the Custom Member Repository

WAS and the CMR.

Process overview: Authorization with the CMR

For instance, the Access Manager SDK uses the checkPassword method while IdentityXML uses all other methods:

  1. After authentication, a user requests access to a portlet through the WebSphere Portal Server.

  2. The Portal Server forwards the request to the CMR.

  3. The CMR forwards the request to the NetPointWASRegistry.

  4. The NetPointWASRegistry sends an IdentityXML call to the Identity Server or uses the Access Manager SDK to contact the Access Server through WebPass or WebGate, depending upon the required method.

    • findByAttribute to search users by attribute

    • getMember

    • getGroupMemberIdentifiers

    • getMembers

    • search etc.

  5. The Identity Server (or Access Server) communicates with the LDAP directory server.

  6. The directory server returns information.

11.10.2 Setting up the WebSphere Portal v5.0.2 with Oracle Access Manager

Integrating the WebSphere Portal v5 with Oracle Access Manager involves a series of installation and configuration tasks.

To integrate the WebSphere Portal with Oracle Access Manager

  1. Complete tasks in "Preparing to Install the Connector":

    1. Install the WebSphere Application Server with appropriate Fix Pack as described in the WebSphere documentation to correct the following issues.

      For example:

      Issue: Access permissions to portlets do not work if the user dn contains intermediate spaces after a comma, for example:

      Cn=PortalUser, o=company, c=us

      IBM has released a Fix PQ93461 for this Portal User access permission problem.

      Action: This fix pack needs to be applied. Verify the Portal Server History Log to ensure that all required fixes have been installed. Refer to the Portal Infocenter document for details.

    2. Install the WebSphere Portal with WebSphere Application Server security disabled.

      Note:

      Both the Global and Java 2 security should be disabled while installing the Portal Server.

      See the IBM WebSphere Portal Infocenter document for details.

    3. Install and configure Oracle Access Manager, as discussed in "Preparing to Install the Connector".

  2. Install the Connector for WebSphere and configure the NetpointWASRegistry and TAI components, as described in "Installing the Connector for WebSphere".

  3. Complete Connector setup and testing, as discussed in "Completing Connector Setup".

  4. In the WebSphere Administration Console, change security to custom registry.

    This specifies the NetPointWASRegistry, which establishes a connection between the WAS and Oracle Access Manager. The WAS uses the NetPointWASRegistry to authenticate and authorize portal users with the Access System's security policies.

  5. Ensure that the following Admin credentials are set in clear text in the NetPointWASRegistry.properties file:

    OB_AdminUserName=admin OB_AdminUserCreds=password

    Where the OB_AdminUserName value is the user ID of the Portal Server administrator who is a Master Administrator or a Master Identity Administrator.

    This is required for the CMR. The Admin credentials should be set in clear text. The NetPointWASRegistry reads the password, encrypts it, and rewrites the properties file with the encrypted password. The encryptor can be executed by running the registryTester program, as well as from WebSphere. To assist you with adding these parameters, see the NetPointWASRegistryProperties.sample file, which includes comments. See also, "NetPointWASRegistry.properties".

    Note:

    The formatting of NetPointWASRegistry.properties is lost when the Connector for WebSphere rewrites the file with the encrypted password. You may want to save a copy of the NetPointWASRegistry.properties.
  6. Restart the WAS Server.

  7. Ensure that the WebSphere Application server and Portal Server is stopped.

  8. Make a back-up copy of the following file:

    WPS_install_dir/config/wpconfig.properties file

    Where WPS_install_dir is the directory where WebSphere Portal Server is installed.

  9. Edit the wpconfig.properties file and add the following:

    PortalAdminId (Example: PortalAdminId=DN of wpsadministrator)
    PortalAdminIdShort (Example: PortalAdminIdShort=wpsadministrator)
    PortalAdminPwd (Example: PortalAdminPwd=wpsadminpassword)
    WasUserid (Example: WasUserid=wasadministrator)
    WasPassword (Example: WasPassword=wasadminpassword)
    PortalAdminGroupId (Example: PortalAdminGroupId=DN of PortalAdminGroupId)
    PortalAdminGroupIdShort (Example: PortalAdminGroupIdShort=PortalAdminGroupId)
    
  10. Restart the WebSphere Application server.

  11. Optional: Turn PUMA traces on in Portal, which can be done by entering the following in the log.properties file.

    For example:

    WPS_install_dir\shared\app\config\log.properties
    

    traceString=com.ibm.wps.services.puma.*=all=enabled:com.ibm.wps.puma.*=all=enabled:com.ibm.wps.command.puma.*=all=enable

  12. Backup the following file:

    WPS_install_dir/shared/app/wmm/wmm.xml file

  13. Edit the file to make the changes for CMR configuration as follows (and the lookaside flag should be set to "false").

    Note that the file named customRepositoryAttributes.xml is a dummy file and is not part of the WebSphere or Oracle Access Manager configuration.

    <supportedMemberTypes>
    
    <supportedMemberType name="Person"
     rdnAttrTypes="uid"
     defaultParentMember="o=company,c=us"
     defaultProfileRepository="CNR"/>
     <!-- o=company,c=us is Root DN. please enter the DN in your environment. -->
    
     <supportedMemberType name="Group"
     rdnAttrTypes="cn"
     defaultParentMember="o=company,c=us"
     defaultProfileRepository="CNR"/> 
     <!-- Name of the CMR information tag -->
     </supportedMemberTypes>
    
     <profileRepository name="NetpointCustomRepository" UUID="CNR"
     description="This is Oracle WMM custom MemberRepository implementation."
     vendor="Oracle"
     adapterClassName="com.oblix.registry.NetPointMemberRepositoryImpl_v5"
     specVersion="1.0" adapterVersion="2.0"
     configurationFile="customRepositoryAttributes.xml"
     wmmGenerateExtId="false" supportGetPersonByAccountName="false"
     supportDynamicAttributes="false" profileRepositoryForGroups="CNR"
     enableTrace="true " PumaService.properties="WPSInstallDir/shared/app/config/services/PumaService.properties"
    NetPointWASRegistry.properties="NetpointWASConnInstallDir\oblix\config\NetPointWASRegistry.properties">
    
    <!-- 1. com.oblix.registry.NetPointMemberRepositoryImpl_v5 is name of the CMR implementtion class 
    2. Mention path of the PUMA service against PumaService.properties paramter.
    3. NetPointWASRegistry.properties - Path of the Oracle Access Manager WAS registry configuration file.
    For Unix this path should be mentioned as "NetpointWASConnInstallDir/oblix/config/NetPointWASRegistry.properties
    4. CustomRepositoryAttributes.xml is a dummy file.
     -->
    
     <readMemberType>
    
     <memberType name="Person" /> <memberType name="Group" />
     <!-- Only read access to portal is provided by COREid Connector CMR-->
     </readMemberType>
     <createMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't create in the sample -->
     </createMemberType> 
    <updateMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" / > -->
     <!-- Commented out - can't update in the sample -->
     </updateMemberType>
     <deleteMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't delete in the sample -->
     </deleteMemberType>
     <renameMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't rename in the sample -->
     </renameMemberType>
     <moveMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't move in the sample -->
     </moveMemberType>
     <nodeMaps>
     <nodeMap node="o=company,c=us" pluginNode="o=company,c=us" />
     <!-- Root DN configured in your environment -->
     </nodeMaps>
     </profileRepository>
    
  14. In the PumaService.properties file, ensure that the following filters are correct for your environment and edit the values if needed.

    For example:

    WPS_install_dir\shared\app\config\services\PumaService.properties
    user.base.attributes=cn,uid,cn,logonId,logonPasswordVerify,logonPassword ...
    group.base.attributes=cn,uniqueOwnerIdentifier,membergroups,groupmembers,memberGroupName,memberGroupType,distinguishedName...
    

    Ensure that the user.minimum.attributes values include all attributes for the user that the CMR will retrieve from the Oracle Access Manager back-end application and send to the WAS portal server. For example:

    user.minimum.attributes=cn,genUserid,cn,givenName,sn,mail...
    

    Ensure that you specify the uniquemember attribute to retrieve group members:

    group.minimum.attributes=cn,uniquemember...
    
  15. In the PumaService.properties file, ensure that all user.minimum.attributes have the correct attribute access control for the Administrator and all are in one of the Identity System panels, as described in the Oracle Access Manager Identity and Common Administration Guide.

    From the Identity System Console menu click User Manager Configuration, click the Configure Tab, click the tab link, click View Object Profile, then click Configure Panels.

  16. Configure WebSphere Portal security by executing the following command.

    Note that some WPSConfig steps may overwrite all of the files that you modified prior to this step, so it is necessary to back up all of these files.

    WPS_install_dir/config/WPSConfig.bat action-secure-portal-ldap
    
  17. Stop WebSphere Portal Server.

  18. Make sure all the configuration file changes done before running WPSConfig.bat are in place.

  19. Restart WebSphere Portal server.

  20. Make sure the systemcred.dn is valid in the following file:

    WPS_install_dir\shared\app\config\services\VaultService.properties file
    

    For example:

    systemcred.dn=cn=PortalAdmin,o=company,c=us
    

    Note:

    This is always the fully qualified unquiet of wpsadmin.
  21. Configure WebSphere Portal credentials by executing the following command

  22. Access http://host:port/wps/portal.

    WPS_install_dir/config/WPSConfig.bat action-create-deployment-credentials

    where host is the fully qualified server name and port is the port number configured for the Portal Server.

  23. Log in to the Portal as the Oracle Access Manager admin user.

    Login should be successful and the Admin user should able to search for users and groups in the Oracle Access Manager repository.

11.10.3 Setting Up WebSphere Portal v5.1 With Oracle Access Manager

Integrating the WebSphere Portal v5.1 for Oracle Access Manager involves a series of installation and configuration tasks.

To integrate the WebSphere Portal v5.1 with Oracle Access Manager

  1. Complete the tasks in "Preparing to Install the Connector":

    1. Install the WebSphere Application Server with appropriate Fix Pack as described in the WebSphere documentation to correct the following issues.

      For example:

      Issue: Access permission is not working for any user dn containing intermediate spaces after the comma separators, as in the following: cn=PortalUser, o=company, c=us.

      Consult IBM Fix PQ93461 for details about this Portal User access permission problem.

      Action: This IBM fix pack needs to be applied. Please verify the Portal Server History Log to ensure that all required fixes have been installed. Refer to the Portal Infocenter documentation for additional details.

    2. Install the WebSphere Portal with WebSphere Application Server security disabled.

      Note:

      Both the Global and Java 2 security should be disabled while installing the Portal Server.

      See the IBM WebSphere Portal Infocenter documentation for details on installation.

    3. Apply Fixes PQ99439 and PK02868_510. This is required for custom user registry configuration of WebSphere Portal 5.1. (If these fixes are not applied, task enable-security-wmmur-custom will fail.)

    4. Apply the latest available "Member Manager cumulative fix for WebSphere Portal version 5.1." This includes a fix for the group membership feature. This cumulative fix is located at the following Web site:

      http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg24009153

    5. Install and configure Oracle Access Manager, as covered in "Preparing to Install the Connector".

  2. Install the Connector for WebSphere and configure the NetpointWASRegistry and TAI components, as described in "Installing the Connector for WebSphere".

  3. Complete Connector setup and testing, as covered in "Completing Connector Setup".

  4. In the WebSphere Administration Console, change security to custom registry. This specifies the NetPointWASRegistry, which establishes a connection between the WAS and Oracle Access Manager. The WAS uses the NetPointWASRegistry to authenticate and authorize portal users through Access System security policies.

  5. Ensure that the following Admin credentials are set in clear text in the NetPointWASRegistry.properties file:

    OB_AdminUserName=admin
    OB_AdminUserCreds=password
    

    Where the OB_AdminUserName value is the user ID of the Portal Server administrator who is a Master Identity Administrator or Oracle Access Manager Administrator. This is required for the CMR. The Admin credentials should be set in clear text. The NetPointWASRegistry reads the password, encrypts it, and rewrites the properties file with the encrypted password. The encryptor can be executed by running the registryTester program, as well as from WebSphere. To assist you with adding these parameters, see the NetPointWASRegistryProperties.sample file, which includes comments. For additional details, consult, "NetPointWASRegistry.properties".

    Note:

    NetPointWASRegistry.properties file formatting is lost when the Connector for WebSphere rewrites the file with the encrypted password. Therefore, you may want to save a copy of the NetPointWASRegistry.properties.
  6. Restart the WAS Server.

  7. Ensure that both the WebSphere Application server and Portal Server are stopped.

  8. Make a back-up copy of the following file:

    WPS_install_dir/config/wpconfig.properties

    Where WPS_install_dir is the directory where WebSphere Portal Server is installed.

  9. Edit the wpconfig.properties file and add the following:

    PortalAdminId (Example: PortalAdminId= DN of wpsadministrator )
    PortalAdminIdShort (Example: PortalAdminId= wpsadministrator )
    PortalAdminPwd (Example: PortalAdminPwd=wpsadminpassword )
    WasUserid (Example: WasUserid=wasadministrator )
    WasPassword (Example: WasPassword=wasadminpassword )
    PortalAdminGroupId (Example: PortalAdminGroupId= DN of PortalAdminGroupId )
    PortalAdminGroupIdShort (Example: PortalAdminGroupIdShort= PortalAdminGroupId )
    LTPAPassword (Example: LTPAPassword= Password configured for LTPA in the AppServer Configuration)
    WmmSystemId (Example: WmmSystemId= Set this value to same as that of PortalAdminIdShort)
    WmmSystemIdPassword (Example: WmmSystemIdPassword= Set this value to same as that of PortalAdminPwd)
    LDAPSuffix (Example: LDAPSuffix=o=company,c=us LDAP suffix of Oracle Access Manager installation)
    LDAPUserSuffix (Example: LDAPUserSuffix=ou=users Keep this blank if user-nodes are directly under LDAPSuffix)
    LDAPGroupSuffix (Example: LDAPGroupSuffix=ou=groups Keep this blank if group-nodes are directly under LDAPSuffix)
    LdapUserPrefix (Example: LdapUserPrefix=cn )
    LdapGroupPrefix (Example: LdapGroupPrefix=cn )
    PortalAdminId (Example: PortalAdminId= DN of wpsadministrator )
    PortalAdminIdShort (Example: PortalAdminId= wpsadministrator )
    PortalAdminPwd (Example: PortalAdminPwd=wpsadminpassword )
    WasUserid (Example: WasUserid=wasadministrator )
    WasPassword (Example: WasPassword=wasadminpassword )
    PortalAdminGroupId (Example: PortalAdminGroupId= DN of PortalAdminGroupId )
    PortalAdminGroupIdShort (Example: PortalAdminGroupIdShort= PortalAdminGroupId )
    LTPAPassword (Example: LTPAPassword= Password configured for LTPA in the AppServer Configuration)
    WmmSystemId (Example: WmmSystemId= Set this value to same as that of PortalAdminIdShort)
    WmmSystemIdPassword (Example: WmmSystemIdPassword= Set this value to same as that of PortalAdminPwd)
    LDAPSuffix (Example: LDAPSuffix=o=company,c=us LDAP suffix of Oracle Access Manager installation)
    LDAPUserSuffix (Example: LDAPUserSuffix=ou=users Keep this blank if user-nodes are directly under LDAPSuffix)
    LDAPGroupSuffix (Example: LDAPGroupSuffix=ou=groups Keep this blank if group-nodes are directly under LDAPSuffix)
    LdapUserPrefix (Example: LdapUserPrefix=cn )
    LdapGroupPrefix (Example: LdapGroupPrefix=cn )
    
  10. Restart the WebSphere Application server.

  11. Optional: Turn on PUMA traces in Portal, which can be done by entering the following in the log.properties file, which typical resides at

    WPS_install_dir\shared\app\config\log.properties

    traceString=com.ibm.wps.services.puma.*=all=enabled:com.ibm.wps.puma.*=all=enabled:com.ibm.wps.command.puma.*=all=enable

  12. Back up the following files:

    WPS_install_dir/wmm/wmm.xml

    WPS_install_dir/wmm/wmm_DB.xml

  13. Make a copy of wmm.xml and save it under the name wmm_custom.xml in the same folder as wmm.xml (WPS_install_dir/wmm/wmm_custom.xml).

    Edit wmm_custom.xml, changing your CMR configuration as follows, and verify that the lookaside flag is set to false.

    <supportedMemberTypes>
    
    <supportedMemberType name="Person"
     rdnAttrTypes="uid"
     defaultParentMember="o=company,c=us"
     defaultProfileRepository="CNR"/>
     <!-- o=company,c=us is Root DN. please enter the DN in your environment. -->
    
     <supportedMemberType name="Group"
     rdnAttrTypes="cn"
     defaultParentMember="o=company,c=us"
     defaultProfileRepository="CNR"/> 
     <!-- Name of the CMR information tag -->
     </supportedMemberTypes>
    
     <profileRepository name="NetpointCustomRepository" UUID="CNR"
     description="This is Oracle WMM custom MemberRepository implementation."
     vendor="Oracle"
     adapterClassName="com.oblix.registry.NetPointMemberRepositoryImpl_v51"
     specVersion="1.0" adapterVersion="2.0"
     configurationFile="customRepositoryAttributes.xml"
     wmmGenerateExtId="false" supportGetPersonByAccountName="false"
     supportDynamicAttributes="false" profileRepositoryForGroups="CNR"
     enableTrace="true " PumaService.properties="WPSInstallDir/shared/app/config/services/PumaService.properties"
    NetPointWASRegistry.properties="NetpointWASConnInstallDir\oblix\config\NetPointWASRegistry.properties">
    
    <!-- 1. com.oblix.registry.NetPointMemberRepositoryImpl_v51 is name of the CMR implementation class 
    2. Mention path of the PUMA service against PumaService.properties paramter.
    3. NetPointWASRegistry.properties - Path of the Oracle Access Manager WAS registry configuration file.
    For Unix this path should be mentioned as "NetpointWASConnInstallDir/oblix/config/NetPointWASRegistry.properties
    4. CustomRepositoryAttributes.xml is a dummy file.
     -->
    
     <readMemberType>
    
     <memberType name="Person" /> <memberType name="Group" />
     <!-- Only read access to portal is provided by COREid Connector CMR-->
     </readMemberType>
     <createMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't create in the sample -->
     </createMemberType> 
    <updateMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" / > -->
     <!-- Commented out - can't update in the sample -->
     </updateMemberType>
     <deleteMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't delete in the sample -->
     </deleteMemberType>
     <renameMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't rename in the sample -->
     </renameMemberType>
     <moveMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't move in the sample -->
     </moveMemberType>
     <nodeMaps>
     <nodeMap node="o=company,c=us" pluginNode="o=company,c=us" />
     <!-- Root DN configured in your environment -->
     </nodeMaps>
     </profileRepository>
    
  14. Overwrite the following files with new contents of wmm_custom.xml:

    WPS_install_dir/wmm/wmm.xml

    WPS_install_dir/wmm/wmm_DB.xml

  15. Ensure that the following filters are correct for your environment in the following file:

    WPS_install_dir\shared\app\config\services\PumaService.properties

    In this file, ensure that the user.minimum.attributes include all attributes for the user that the CMR will retrieve from Oracle Access Manager and send to the WAS portal server.In the required attributes list in user.base.attributes, enter all attributes that are required for searching in the WAS portal server for users with these attribute values.Make sure that group.minimum.attributes has assigned uniqueMember and class attribute configured for Group object class. (In the following sample file it is "cn").The user.password.attribute should be set to name of the password attribute.Ensure that directory is set to CUSTOM.Edit the values, as needed.

    #SAMPLE PumaService.properties file. Please make changes according to your environment
     
    #In the following sample file. User object classAttribute is uid and Group object class attribute is cn. 
     
    #Please set these values according to your environment.
     
    user.fbadefault.filter=uid
    user.template.attribute=uid
    user.password.attribute=userPassword
    user.minimum.attributes=uid,cn
    user.base.attributes=uid,cn,givenName,sn,preferredLanguage
    user.sync.remove.attributes=passwordCreation,RDN,lastSession,selfAddress,packageSuppression,createdTimestamp,policyAccountId,registrationUpdate,uniqueUserIdentifier,memberId,ancestors,addressId,truncatedUniqueIdentifier,profileType,registration,primary,approvalState,lastOrder,publishPhone2,publishPhone1,salt,addressBookId,uniqueParentIdentifier,parentMemberId,registrationCancel,passwordExpired,previousLastSession,displayName,addressType,shortName,preferredLanguageId,userId,timeout,registerType,uniqueIdentifier,passwordInvalid,nickName,type,membergroups,income,age,organizationUnitId,demographicField6,children,household,status,passwordRetries,uniqueNumericIdentifier,cn
    group.fbadefault.filter=cn
    group.template.attribute=cn
    group.minimum.attributes=cn,uniqueMember
    group.base.attributes=cn,uniqueMember
    group.sync.remove.attributes=uniqueOwnerIdentifier,membergroups,groupmembers,memberGroupName,memberGroupType,distinguishedName,cn,uniqueNumericIdentifier,uniqueMemberIdentifier
    directory=CUSTOM
    ejbName=ejb/MemberServiceHome
    
  16. Ensure that all user.minimum.attributes have the correct attribute access controls for the Administrator.

    See Oracle Access Manager Identity and Common Administration Guide for details.

    Also ensure that all user.minimum.attributes are in one of the Identity System panels, as described in the Oracle Access Manager Identity and Common Administration Guide.

    To access these panels, from the Identity System Console, click User Manager Configuration, click Tabs, click the link for the tab, click View Object Profile, then click Configure Panels.

  17. Modify the file WPS_install_dir/wmm/wmmWASAdmin.xml as follows:

    <?xml version="1.0" encoding="UTF-8"?>
    <wmmWASAdmins>
      <admin logonId="PortalAdmin" logonPassword="oblixoblix" uniqueUserId="cn=Portal Admin,o=company,c=us"/>
    </wmmWASAdmins>
    

    logonId, logonPassword and uniqueUserId correspond to the new values of PortalAdminIdShort, PortalAdminId, and PortalAdminPwd respectively in wpconfig.properties.

  18. Modify the WPS_install_dir/wmm/wmmur.xml file.

    Set the value of wmmnode to your LDAPRoot as follows:

    <node wmmnode="o=company,c=us"/>

  19. Modify WPS_install_dir/wmm/wmmAttributes.xml so that it contains only supported attributes.

    The wmmAttributes.xml file contains definitions of all the supported attributes. Each attribute definition might have two properties named applicableMemberTypes and requiredMemberTypes. Values of these properties should be supported member types. For example, if wmm_custom.xml has only two supportedMemberTypes (Person and Group), then other types such as organizationalUnit or organization should not be applicableMemberTypes or requiredMemberTypes for any of the attributes in wmmAttributes.xml.

  20. Modify WPS_install_dir/shared/app/config/services/VaultService.properties.

    Set the value of systemcred.dn to the DN of wpsadministrator.

    Example:

    systemcred.dn=cn=Portal Admin,o=company,c=us
    
  21. Backup all configuration files, stop the portal server, then configure WebSphere Portal security by executing the following command:

    WPS_install_dir/config/WPSConfig.bat enable-security-wmmur-custom

  22. Verify that all of the configuration files are in place.

    You can compare the values with the backup copies that you created in the previous step.

    The contents of wmm.xml should match the contents of wmm_custom.xml.

  23. Restart the portal server.

  24. Access the following Web page:

    http://host:port/wps/portal

    where host is the fully qualified server name and port is the port number configured for the Portal Server.

  25. Log in to the Portal as the Oracle Access Manager admin user. The Login should succeed, and Admin user should able to search for other Oracle Access Manager Repository users and groups.

11.10.4 Setting Up WebSphere Portal v6.0 With Oracle Access Manager

Integrating the WebSphere Portal v5.1 for Oracle Access Manager involves a series of installation and configuration tasks.

To integrate the WebSphere Portal v6.0 with Oracle Access Manager

  1. Complete the tasks in "Preparing to Install the Connector":

    1. Install the WebSphere Application Server.

    2. Install the WebSphere Portal with WebSphere Application Server security disabled.

      Note:

      Both the Global and Java 2 security should be disabled while installing the Portal Server.

      See the IBM WebSphere Portal Infocenter documentation for details on installation.

    3. Install and configure Oracle Access Manager, as covered in "Preparing to Install the Connector".

  2. Install the Connector for WebSphere and configure the NetpointWASRegistry and TAI components, as described in "Installing the Connector for WebSphere".

  3. Complete Connector setup and testing, as covered in "Completing Connector Setup".

  4. In the WebSphere Administration Console, change security to custom registry. This specifies the NetPointWASRegistry, which establishes a connection between the WAS and Oracle Access Manager. The WAS uses the NetPointWASRegistry to authenticate and authorize portal users through Access System security policies.

  5. Ensure that the following Admin credentials are set in clear text in the NetPointWASRegistry.properties file:

    OB_AdminUserName=admin
    OB_AdminUserCreds=password
    

    Where the OB_AdminUserName value is the user ID of the Portal Server administrator who is a Master Identity Administrator or Oracle Access Manager Administrator. This is required for the CMR. The Admin credentials should be set in clear text. The NetPointWASRegistry reads the password, encrypts it, and rewrites the properties file with the encrypted password. The encryptor can be executed by running the registryTester program, as well as from WebSphere. To assist you with adding these parameters, see the NetPointWASRegistryProperties.sample file, which includes comments. For additional details, consult, "NetPointWASRegistry.properties".

    Note:

    NetPointWASRegistry.properties file formatting is lost when the Connector for WebSphere rewrites the file with the encrypted password. Therefore, you may want to save a copy of the NetPointWASRegistry.properties.
  6. Restart the WAS Server.

  7. Ensure that both the WebSphere Application server and Portal Server are stopped.

  8. Make a back-up copy of the following file:

    WPS_install_dir/config/wpconfig.properties

    Where WPS_install_dir is the directory where WebSphere Portal Server is installed.

  9. Edit the wpconfig.properties file and add the following:

    PortalAdminId (Example: PortalAdminId= DN of wpsadministrator)
    PortalAdminIdShort (Example: PortalAdminId= wpsadministrator)
    PortalAdminPwd (Example: PortalAdminPwd=wpsadminpassword)
    WasUserid (Example: WasUserid=wasadministrator)
    WasPassword (Example: WasPassword=wasadminpassword)
    PortalAdminGroupId (Example: PortalAdminGroupId= DN of PortalAdminGroupId)
    PortalAdminGroupIdShort (Example: PortalAdminGroupIdShort= PortalAdminGroupId)
    LTPAPassword (Example: LTPAPassword= Password configured for LTPA in the AppServer Configuration)
    WmmSystemId (Example: WmmSystemId= Set this value to same as that of PortalAdminIdShort)
    WmmSystemIdPassword (Example: WmmSystemIdPassword= Set this value to same as that of PortalAdminPwd)
    LDAPSuffix (Example: LDAPSuffix=o=company,c=us LDAP suffix of Oracle Access Manager installation)
    LDAPUserSuffix (Example: LDAPUserSuffix=ou=users Keep this blank if user-nodes are directly under LDAPSuffix)
    LDAPGroupSuffix (Example: LDAPGroupSuffix=ou=groups Keep this blank if group-nodes are directly under LDAPSuffix)
    LdapUserPrefix (Example: LdapUserPrefix=cn)
    LdapGroupPrefix (Example: LdapGroupPrefix=cn)
    
    PortalAdminId (Example: PortalAdminId= DN of wpsadministrator )
    PortalAdminIdShort (Example: PortalAdminId= wpsadministrator )
    PortalAdminPwd (Example: PortalAdminPwd=wpsadminpassword )
    WasUserid (Example: WasUserid=wasadministrator )
    WasPassword (Example: WasPassword=wasadminpassword )
    PortalAdminGroupId (Example: PortalAdminGroupId= DN of PortalAdminGroupId )
    PortalAdminGroupIdShort (Example: PortalAdminGroupIdShort= PortalAdminGroupId )
    LTPAPassword (Example: LTPAPassword= Password configured for LTPA in the AppServer Configuration)
    WmmSystemId (Example: WmmSystemId= Set this value to same as that of PortalAdminIdShort)
    WmmSystemIdPassword (Example: WmmSystemIdPassword= Set this value to same as that of PortalAdminPwd)
    LDAPSuffix (Example: LDAPSuffix=o=company,c=us LDAP suffix of Oracle Access Manager installation)
    LDAPUserSuffix (Example: LDAPUserSuffix=ou=users Keep this blank if user-nodes are directly under LDAPSuffix)
    LDAPGroupSuffix (Example: LDAPGroupSuffix=ou=groups Keep this blank if group-nodes are directly under LDAPSuffix)
    LdapUserPrefix (Example: LdapUserPrefix=cn )
    LdapGroupPrefix (Example: LdapGroupPrefix=cn )
    PortalAdminId (Example: PortalAdminId= DN of wpsadministrator )
    PortalAdminIdShort (Example: PortalAdminId= wpsadministrator )
    PortalAdminPwd (Example: PortalAdminPwd=wpsadminpassword )
    WasUserid (Example: WasUserid=wasadministrator )
    WasPassword (Example: WasPassword=wasadminpassword )
    PortalAdminGroupId (Example: PortalAdminGroupId= DN of PortalAdminGroupId )
    PortalAdminGroupIdShort (Example: PortalAdminGroupIdShort= PortalAdminGroupId )
    LTPAPassword (Example: LTPAPassword= Password configured for LTPA in the AppServer Configuration)
    WmmSystemId (Example: WmmSystemId= Set this value to same as that of PortalAdminIdShort)
    WmmSystemIdPassword (Example: WmmSystemIdPassword= Set this value to same as that of PortalAdminPwd)
    LDAPSuffix (Example: LDAPSuffix=o=company,c=us LDAP suffix of Oracle Access Manager installation)
    LDAPUserSuffix (Example: LDAPUserSuffix=ou=users Keep this blank if user-nodes are directly under LDAPSuffix)
    LDAPGroupSuffix (Example: LDAPGroupSuffix=ou=groups Keep this blank if group-nodes are directly under LDAPSuffix)
    LdapUserPrefix (Example: LdapUserPrefix=cn )
    LdapGroupPrefix (Example: LdapGroupPrefix=cn )
    

    Note that the script may fail unless you set the following parameters:

    WpsContentAdministrators (Example: WpsContentAdministrators = DN of Content Administrator group)
    WpsDocReviewer (Example: WpsDocReviewer = DN of Document Reviewer group)
    
  10. Restart the WebSphere Application server.

  11. Optional: Turn on PUMA traces in Portal, which can be done by entering the following in the log.properties file, which typical resides at

    WPS_install_dir\shared\app\config\log.properties

    traceString=com.ibm.wps.services.puma.*=all=enabled:com.ibm.wps.puma.*=all=enabled:com.ibm.wps.command.puma.*=all=enable

  12. Back up the following files:

    WPS_install_dir/wmm/wmm.xml

    WPS_install_dir/wmm/wmm_DB.xml

  13. Make a copy of wmm.xml and save it under the name wmm_custom.xml in the same folder as wmm.xml (WPS_install_dir/wmm/wmm_custom.xml).

    Edit wmm_custom.xml, changing your CMR configuration as follows, and verify that the lookaside flag is set to false.

    <supportedMemberTypes>
    
    <supportedMemberType name="Person"
     rdnAttrTypes="uid"
     defaultParentMember="o=company,c=us"
     defaultProfileRepository="CNR"/>
     <!-- o=company,c=us is Root DN. please enter the DN in your environment. -->
    
     <supportedMemberType name="Group"
     rdnAttrTypes="cn"
     defaultParentMember="o=company,c=us"
     defaultProfileRepository="CNR"/> 
     <!-- Name of the CMR information tag -->
     </supportedMemberTypes>
    
     <profileRepository name="NetpointCustomRepository" UUID="CNR"
     description="This is Oracle WMM custom MemberRepository implementation."
     vendor="Oracle"
     adapterClassName="com.oblix.registry.NetPointMemberRepositoryImpl_v51"
     specVersion="1.0" adapterVersion="2.0"
     configurationFile="customRepositoryAttributes.xml"
     wmmGenerateExtId="false" supportGetPersonByAccountName="false"
     supportDynamicAttributes="false" profileRepositoryForGroups="CNR"
     enableTrace="true "
    
    PumaService.properties="WPSInstallDir/config/properties/PumaService.properties"
    NetPointWASRegistry.properties="NetpointWASConnInstallDir\oblix\config\NetPointWASRegistry.properties">
    
    <!-- 1. com.oblix.registry.NetPointMemberRepositoryImpl_v51 is name of the CMR implementation class 
    2. Mention path of the PUMA service against PumaService.properties paramter.
    3. NetPointWASRegistry.properties - Path of the Oracle Access Manager WAS registry configuration file.
    For Unix this path should be mentioned as "NetpointWASConnInstallDir/oblix/config/NetPointWASRegistry.properties
    4. CustomRepositoryAttributes.xml is a dummy file.
     -->
    
     <readMemberType>
    
     <memberType name="Person" /> <memberType name="Group" />
     <!-- Only read access to portal is provided by COREid Connector CMR-->
     </readMemberType>
     <createMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't create in the sample -->
     </createMemberType> 
    <updateMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" / > -->
     <!-- Commented out - can't update in the sample -->
     </updateMemberType>
     <deleteMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't delete in the sample -->
     </deleteMemberType>
     <renameMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't rename in the sample -->
     </renameMemberType>
     <moveMemberType>
     <!-- <memberType name="Person" /> <memberType name="Group" /> -->
     <!-- Commented out - can't move in the sample -->
     </moveMemberType>
     <nodeMaps>
     <nodeMap node="o=company,c=us" pluginNode="o=company,c=us" />
     <!-- Root DN configured in your environment -->
     </nodeMaps>
     </profileRepository>
    
  14. Overwrite the following files with new contents of wmm_custom.xml:

    WPS_install_dir/wmm/wmm.xml

    WPS_install_dir/wmm/wmm_DB.xml

  15. Ensure that the following filters are correct for your environment in the following file:

    WPS_install_dir\config\properties\PumaService.properties

    In this file, ensure that the user.minimum.attributes include all attributes for the user that the CMR will retrieve from Oracle Access Manager and send to the WAS portal server.In the required attributes list in user.base.attributes, enter all attributes that are required for searching in the WAS portal server for users with these attribute values.Make sure that group.minimum.attributes has assigned uniqueMember and class attribute configured for Group object class. (In the following sample file it is "cn").The user.password.attribute should be set to name of the password attribute.Ensure that directory is set to CUSTOM.Edit the values, as needed.

    #SAMPLE PumaService.properties file. Please make changes according to your environment
     
    #In the following sample file. User object classAttribute is uid and Group object class attribute is cn. 
     
    #Please set these values according to your environment.
     
    user.fbadefault.filter=uid
    user.template.attribute=uid
    user.password.attribute=userPassword
    user.minimum.attributes=uid,cn
    user.base.attributes=uid,cn,givenName,sn,preferredLanguage
    user.sync.remove.attributes=passwordCreation,RDN,lastSession,selfAddress,packageSuppression,createdTimestamp,policyAccountId,registrationUpdate,uniqueUserIdentifier,memberId,ancestors,addressId,truncatedUniqueIdentifier,profileType,registration,primary,approvalState,lastOrder,publishPhone2,publishPhone1,salt,addressBookId,uniqueParentIdentifier,parentMemberId,registrationCancel,passwordExpired,previousLastSession,displayName,addressType,shortName,preferredLanguageId,userId,timeout,registerType,uniqueIdentifier,passwordInvalid,nickName,type,membergroups,income,age,organizationUnitId,demographicField6,children,household,status,passwordRetries,uniqueNumericIdentifier,cn
    group.fbadefault.filter=cn
    group.template.attribute=cn
    group.minimum.attributes=cn,uniqueMember
    group.base.attributes=cn,uniqueMember
    group.sync.remove.attributes=uniqueOwnerIdentifier,membergroups,groupmembers,memberGroupName,memberGroupType,distinguishedName,cn,uniqueNumericIdentifier,uniqueMemberIdentifier
    directory=CUSTOM
    ejbName=ejb/MemberServiceHome
    
  16. Ensure that all user.minimum.attributes have the correct attribute access controls for the Administrator.

    See Oracle Access Manager Identity and Common Administration Guide for details.

    Also ensure that all user.minimum.attributes are in one of the Identity System panels, as described in the Oracle Access Manager Identity and Common Administration Guide.

    To access these panels, from the Identity System Console, click User Manager Configuration, click Tabs, click the link for the tab, click View Object Profile, then click Configure Panels.

  17. Modify the file WPS_install_dir/wmm/wmmWASAdmin.xml as follows:

    <?xml version="1.0" encoding="UTF-8"?>
    <wmmWASAdmins>
      <admin logonId="PortalAdmin" logonPassword="oblixoblix" uniqueUserId="cn=Portal Admin,o=company,c=us"/>
    </wmmWASAdmins>
    

    Where logonId, logonPassword and uniqueUserId correspond to the new values of PortalAdminIdShort, PortalAdminPwd, and PortalAdminId respectively in wpconfig.properties.

  18. Modify the WPS_install_dir/wmm/wmmur.xml file.

    Set the value of wmmnode to your LDAPRoot as follows:

    <node wmmnode="o=company,c=us"/>

  19. Modify WPS_install_dir/wmm/wmmAttributes.xml so that it contains only supported attributes.

    The wmmAttributes.xml file contains definitions of all the supported attributes. Each attribute definition might have two properties named applicableMemberTypes and requiredMemberTypes. Values of these properties should be supported member types. For example, if wmm_custom.xml has only two supportedMemberTypes (Person and Group), then other types such as organizationalUnit or organization should not be applicableMemberTypes or requiredMemberTypes for any of the attributes in wmmAttributes.xml.

  20. Modify WPS_install_dir/config/properties/VaultService.properties.

    Set the value of systemcred.dn to the DN of wpsadministrator.

    Example:

    vault.default-release.class=com.ibm.wps.services.credentialvault.DefaultVault
    vault.default-release.config=defaultvault
    vault.default-release.domain=rel
    vault.default-release.manageresources=true
    vault.default-release.readonly=false
    systemcred.dn=cn=Portal Admin,o=company,c=us
    
  21. Back up all configuration files, stop the portal server, then configure WebSphere Portal security by executing the following command:

    WPS_install_dir/config/WPSConfig.bat enable-security-wmmur-custom

  22. Verify that all of the configuration files are in place.

    You can compare the values with the backup copies that you created in the previous step.

    The contents of wmm.xml should match the contents of wmm_custom.xml.

  23. Restart the portal server.

  24. Access the following Web page:

    http://host:port/wps/portal

    where host is the fully qualified server name and port is the port number configured for the Portal Server.

  25. Log in to the Portal as the Oracle Access Manager admin user. The Login should succeed, and Admin user should able to search for other Oracle Access Manager Repository users and groups.

11.10.5 Managing Users and Groups with Portal v5 and v6

Portal Administrators can use the Identity System to perform user and group management tasks such as adding or deleting users and groups, modifying user profiles and attributes.

To use the Identity System user and group management functionality, ensure that you do not create users and groups in the WebSphere Portal. Instead, create and modify users and groups in the Identity System.

You can add and delete static groups and user membership in groups through the Identity System. The information that you update in the Identity System is immediately reflected in the WebSphere Portal.

Note:

To recognize group membership, the Identity System requires the dynamic group to be expanded.

After you create users and groups in the Identity System, you can search for them in the WebSphere Portal.

See the Oracle Access Manager Identity and Common Administration Guide for more information on managing users and groups.

11.10.6 Modifying User Profiles and Attributes with Portal v5 and v6

When users modify their profile through the Identity System, the modifications are immediately visible in the WebSphere Portal. This ensures that the most current user information is used when portal developers personalize user pages.

You can map additional attributes to a use's profile if necessary. See the WebSphere Portal documentation for information on mapping attributes.

11.10.7 Password Management with Portal v5 and v6

Because the portal uses Access System SSO, users are subject to the Oracle Access Manager password policies during authentication.

Important:

To implement the password management feature, turn off the portal's password management functionality.

The Oracle Access Manager password management functionality includes defining password policies, resetting passwords, expiration notification, and challenge phrases for lost passwords.

See the Oracle Access Manager Identity and Common Administration Guide for more information on password policies.

11.10.8 Access Control for the WebSphere Portal v5 and v6

Portal administrators use the portal's access control functionality to grant access to portlets. From the WebSphere Portal, administrators can search for Oracle Access Manager-managed users and groups to whom they want to grant portal administration privileges as well as portlet access control.

11.10.9 Configuring Single Sign-on Functions for the Portal v5 and v6

Configuring SSO between the Access System and the WebSphere portal enables the WebSphere portal to utilize the ObSSOCookie and enable Connector for WebSphere to authenticate Oracle Access Manager users.

Configuring SSO logout for the WebSphere Portal Server ensures that when a user logs out of a Access System-protected WebSphere resource, both the LTPA token and the ObSSOCookie are killed. The user will not be able to access any other WebSphere resource or other Access System-protected resources without authenticating again.

  • If you have configured the TAI for single sign-on between Oracle Access Manager and WebSphere, you must configure single sign-on logout for the WebSphere Portal Server.

  • If you have not configured the TAI for single sign-on, users can use the portal's logout button to log out of all Access System-protected resources.

To configure single sign-on for the WebSphere Portal v5 and v6

  1. Install the WebGate plug-in for the Web server that you selected when you installed the WebSphere Portal.

  2. In the Policy Manager, define the URL that you want to protect.

A WebGate prompts for authentication when users attempt to log in to this URL. Be sure to protect / if you want the WebGate to prompt for authentication when the user gets to the root of the WebSphere Portal. You can also add other authorization rules, if needed.

Note:

To protect resources, Oracle recommends that you use a form-based authentication scheme. However, if you use the basic authentication scheme, set the Challenge Redirect field to another WebGate to ensure that the ObSSOCookie gets set. See the Oracle Access Manager Access System Administration Guide for more information on authentication schemes.

To configure single sign-on logout for WebSphere Portal v5 and v6

  1. Create an Access System policy with a Form Over LDAP type of authentication scheme to protect the portal URL, as described in the Oracle Access Manager Access System Administration Guide.

  2. Create a custom logout page using HTML, JSP, or CGI protocol.

    The default logout page for Oracle Access Manager, logout.html, is located in:

    WebGate_install_dir\access\oblix\apps\common\bin

    Where WebGate_install_dir is the directory where the WebGate is installed.

  3. Save the logout page in the document root of the Web server on which the WebGate that protects WebSphere is installed.

    For example:

    http://foobar/myportal/logout.html

    Note:

    Ensure that the name of the logout page contains the string "logout".
  4. Protect the logout page with an Access System policy, as described in the Oracle Access Manager Access System Administration Guide.

  5. Locate and open the following file:

    For WebSphere Portal version 5:

    WPS_install_dir\shared\app\config\services\ConfigServices.propertiesFor WebSphere Portal version 6:

    WPS_install_dir\config\properties\ConfigServices.propertiesWhere WPS_install_dir is the directory where WebSphere Portal Server is installed.

  6. Add the following two parameters in ConfigServices.properties file:

    redirect.logout = true

    redirect.logout.url = The path to the logout page

    For example:

    • http://foobar/myportal/logout.html

  7. For WebSphere Portal v5, back up the properties files in WPS_Install_Dir/config/properties/

  8. For Websphere Portal v6, back up the properties files in the following directory:

    WPS_Install_Dir/config/properties/

    Ensure that the Application Server and Portal Server are not running.

    • On Windows, run the following command:

      WPS_Install_Dir\config\WPSconfig.bat update-properties
      
    • On UNIX, run the following command:

      WPS_Install_Dir/config/WPSconfig.sh update-properties
      

    After successfully completing the commands, restore the properties files from backup.

  9. Restart the WebSphere Portal Server and Application Server.

11.11 Configuration Files

The following configuration files are used when integrating Connector for WebSphere with WAS:

11.11.1 NetPointWASRegistry.properties

Table 11-1 describes the parameters of NetPointWASRegistry.properties file located in CWS_install_dir /oblix/config. This file contains data that was specified during NetPointWASRegistry installation, as well as some default parameter values for logging. For example:

# Logging level (none, info or debug);
OB_LogLevel=debug 
OB_LogFileName=C:/CWS_install_dir/log

The Oracle Access Manager Connector for WebSphere caches data that it receives from the Access or Identity Server. For subsequent requests from WebSphere servers, user and group data is retrieved from the connector cache. The caches are updated on a scheduled basis. Each user, group, or user profile attribute entry in the connector cache is associated with a Time To Live (TTL) parameter that is defined in the NetPointWASRegistry.properties file. When a request is issued after the timeout limit is reached, the cache miss handler is invoked and fresh data is retrieved from the Identity and Access servers. The default timeout for all cache parameters in the NetpointWASRegistry.properties file is 3600 seconds. This value can be set as needed. There is no dynamic cache updating between Identity and Access Servers and the connector. To reflect user, group, or user profile attribute changes immediately, set the cache timeout value to 0. A value of 0 disables the connector cache.

Note:

Webpass to GroupSrvCenter performance has been improved with the addition of configuration options to improve IdentityXML calls in the Identity System. For example, when no nested groups are used and are turned off, you may use a new option so that getGroups will not generate a request for nested groups.

Tip:

See also Table 11-1.

Table 11-1 Parameters in NetPointWASRegistry.properties

Parameter Name Description Optional/ Mandatory

Installation

.

.

OB_InstallDir

The directory where NetPointWASRegistry is installed.

Mandatory

Logging

.

.

OB_LogLevel

The logging level that is recorded in the log file. Values are none, info, and debug.

Optional

OB_LogFileName

The file name for Custom User Registry (NetPointWASRegistry) log messages. Default = CWS_install_dir/log

Note: Log messages for the CMR are directed to the WPS_install_dir/log/appserver-out.log file.

Optional

OB_LogMilliSeconds=true

The data/time format of log messages in the file specified with OB_LogFileName. When true, log messages are time formatted in milliseconds. Default =true

Optional

WebPass

.

.

OB_WebPassHost

The WebPass server host machine name. The host name must be fully qualified; for example, OB_WebPassHost=hostname.acme.com.

To configure multiple WebPass instances for failover purposes, separate the names with a comma.

For example:

OB_WebPassHost=foo.domain.com, bar.domain.com

Note that the host name corresponds to the port number in the specified order. See the example in the Ob_WebPassPort description in this table.

Mandatory

OB_WebPassPort

The port number of the host machine.

To configure multiple WebPass instances, separate the port numbers with a comma. For example:

OB_WebPassPort=80, 81

Note that the host name corresponds to the port number in the specified order. In this example, the hostname:port number pairing is as follows:

foo.domain.com:80

bar.domain.com:81

For failover to work, all other variables such as user name, credentials and webgate protection must be the same.

Mandatory

OB_WebPassIsProtected

Values are true and false. If WebPass is protected, set value=true.

Mandatory

OB_AdminUserName

The Identity System requires the Admin username and password to make IdentityXML calls to the WebPass. For details about administrator rights, see "Configuring the Identity Server".

Mandatory

OB_AdminUserCreds

The Identity System requires the Admin username and password to make IdentityXML calls to the WebPass. Without the password the connector will not work.

Note: You need to enter a clear-text password, which the program will encrypt and rewrite to the properties file after the first run.

Mandatory

Cookie

.

.

OB_CookieDomain

The cookie domain specified in the WebGate installer configuration. Needed if WebPass is protected.

For example, .xyz.com

Mandatory

OB_CookiePath

The cookie path specified in the WebGate configuration. Needed if WebPass is protected.

Default = /

Mandatory

WebPass SSL

.

.

OB_WebPassSSLEnabled

Specifies whether WebPass needs HTTPS connection. Values are true and false.

Default = false

Mandatory

Login and Search Attributes

.

.

OB_UserAttr

The unique user identification (for example, uid).

Mandatory

OB_UserSearchAttr

The DN prefix for users from LDAP (for example, cn).

Mandatory

OB_GroupSearchAttr

The DN prefix for groups from LDAP (for example, cn).

Mandatory

Active Directory Forest

.

.

OB_WebPassADDomain

Optional. The domain of the Admin user. To be used in case of Active Directory Forest with multiple domains. For example, OB_WebPassADDomain=ou=company,dc=qalab,dc=acme,dc=comThe ADDomain must be the same as the default defined in the Identity Server.

Optional

Records Returned

.

.

OB_WebPassXPIRecordsReturned

Optional. The number of records to return for getUsers or getGroups. This is used only in the WebSphere Portal.Default = return all

Optional

Authentication

.

.

OB_AuthnSchemeResourceTypeName

Authen

Mandatory

OB_AuthnSchemeOperation

LOGIN

Mandatory

OB_AuthnSchemeResourceName

/Authen/Basic

Mandatory

OB_AuthzActionType

WAS_Registry

Mandatory

OB_AuthzActionName

uid

Mandatory

Cache

.

.

OB_AllUserCache_enabled

Enables caching of all users.Values are true and false.

Optional

OB_AllUserCache_timeout

Timeout for cache of list of all users.

Optional

OB_UserAttributesCache_enabled

Enables Caching of user attributes.Values are true and false.

Optional

OB_UserAttributesCache_timeout

The timeout for the cache of user attributes. Timeout is for the whole cache.

Optional

OB_UserAttributesCacheElement_timeout

The timeout for the cached user attributes. The Timeout is per user.

Optional

OB_GroupAttributesCache_enabled

Enables Caching of group attributes.Values are true and false.

Optional

OB_GroupAttributesCache_timeout

The timeout for the cache of group attributes. Timeout is for the whole cache.

Optional

OB_GroupAttributesCacheElement_timeout

The timeout for the cached group attributes. The Timeout is per group.

Optional

OB_AllGroupCache_enabled

Enables caching of list of all groups. Values are true and false.Used only for all groups, and mostly used by the Admin Console.

Optional

OB_AllGroupCache_timeout

The timeout for cache of the list of all groups.

Optional

OB_UserGroupsCache_enabled

Enables caching of list groups of which the user is a member.Values are true and false.Maintains a cache of all the groups a logged in user belongs to.

Optional

OB_UserGroupsCache_timeout

The timeout for cache of the list of groups for a user. The timeout is per user. This value should not be very high--if the user's group membership changes the new membership will only take affect at cache timeout. For example, a value of 3600 equates to 1 hour.

Optional

OB_GroupMembersCache_enabled

Enables caching of list of groups and list of members in each group.Values are true and false.Stores members for each groups (not a frequently used cache).

Optional

OB_GroupMembersCache_timeout

Specifies the timeout for cache of list of groups and the list of members in each group.

Optional

Keystore

.

.

OB_Keystore

Specifies the keystore file used by the registry when it makes SSL connections to HTTPS WebPass. The keystore contains the requestor's public and private key pairs, X.509 certificate, and certificates for Certificate Authorities trusted to certify responder servers. The keystore is managed using the JDK keytool.

For example:

CWS_install_dir/oblix/config/jssecacerts

Optional

OB_KeystorePassword

Optional. The password for the keystore.

Optional

Users and Groups

.

.

OB_UserTabId

For future use. Do not change the default.Default = Employees

Mandatory

OB_GroupTabId

For future use. Do not change the default.Default = Groups

Mandatory

Performance

.

.

OB_NestedGroupsEnabled

Values are true and false. The default is true.To improve GroupSrvCenter performance when nested groups are not used, set the value to false.

  • Nested groups will not be included in the search; the uniquemember attribute will not be requested in a group search when OB_NestedGroupsEnabled=false.

  • A value of true retrieves the uniquemember attribute in the group search, uses this for nested group computation, then removes it before the group is recorded.

Optional

OB_DynamicGroupsEnabled

Values are true and false.To improve GroupSrvCenter performance when you are not using dynamic groups, set the value to false. Dynamic groups will not be included in the search.

Optional

Non-Unique Login ID in Different Domains

.

.

OB_DnIsUniqueIdentifier=See also OB_DnIsUniqueIdentifier= in "WebGate.properties".

Values are true and false. The default is false.Set the value to true to enable the Connector for WebSphere to work in a multi-domain directory server with a non-unique login ID in the different domains.

Optional


11.11.2 WebGate.properties

Table 11-2 describes the parameters of the webgate.properties file. This file is located in CWS_install_dir /oblix/config with a copy in WAS_install_dir \properties.

Table 11-2 Parameters in webgate.properties

Parameter Description

OB_InstallDir

The directory where the NetPointWASRegistry is installed. Default =CWS_install_dir

OB_ISPROXYENABLED

Not required unless you use a proxy server. The default value is false. If you use a proxy server the value must be changed to true.

OB_hostnames

Not required unless you use a proxy server. The name of the host machine. This is only used for proxy servers.

Ob_loginID

Not required.

OB_AuthnSchemeResourceTypeName

Authen

OB_AuthnSchemeOperation

LOGIN

OB_AuthnSchemeResourceName

/Authen/Basic

OB_AuthzActionType

uid

OB_DnIsUniqueIdentifier

Not required unless you want to enable the Connector for WebSphere to work in a multi-domain directory server with a non-unique login ID in the different domains.

See also, Non-Unique Login ID in Different Domains in "NetPointWASRegistry.properties".


11.11.3 TrustedServers.properties

Table 11-3 describes the parameters of the trustedservers.properties configuration file.

Table 11-3 Parameters in TrustedServers.properties

Parameter Description

com.ibm.websphere.security.trustassociation.enabled

true

com.ibm.websphere.security.trustassociation.types

webgate

com.ibm.websphere.security.trustassociation.webgate.interceptor

com.oblix.tai.WebGateTrustAssociationInterceptor

com.ibm.websphere.security.trustassociation.webgate.config

webgate


11.12 Implementation Notes for the TAI

The following implementation is optional to enable the Connector for WebSphere to work in a multi-domain directory server with a non-unique login ID in the different domains.

To accomplish this optional implementation, you use two parameters in the NetPointWASRegistry.properties file:

OB_DnIsUniqueIdentifier=

The default is false. Be sure to set OB_DnIsUniqueIdentifier to true if the DN is being used.

To enable the Connector for WebSphere to work in a multi-domain directory server with a non-unique login ID in the different domains, you also need the following parameter in the webgate.properties file:

OB_DnIsUniqueIdentifier=false

This optional parameter is used when the TAI module is configured to pass on the users DN instead of the userAttr or LoginID. The default is false. If the OB_DnIsUniqueIdentifier parameter is set to true, the DN is used to communicate between the TAI and Registry. Be sure to set the OB_DnIsUniqueIdentifier to true if the DN is being used.

Note:

The NetPointRegistry.properties and webgate.properties files must be synchronized.

The optional implementation described in the previous paragraphs works with the following caveats:

On WAS 5, role mapping can be done only through Identity System groups.

11.13 Implementation Notes for Active Directory

The following sections discuss issues to consider when implementing the Connector for WebSphere on Active Directory:

11.13.1 Configuring the Connector for WebSphere for an Active Directory Forest

The steps to configure the Connector for WebSphere for an Active Directory Forest follow.

To configure the Connector for an Active Directory forest

  1. In the Access System Console, create a new Basic Over LDAP authentication scheme for a domain in the Active Directory Forest.

    The base credentials that you specify in the Plugin(s) field must be the same as the search base that you specified in the directory server profile.

    Graphic of credentials in the plug-in field.

    If you already created an administrator during pre-installation setup, you do not need to complete step 2. See "Preparing to Install the Connector" for more information.

  2. Create a WebSphere administrator in Oracle Access Manager with View and Delegated Administration rights.

    Ensure that the administrator's login identification is unique.

  3. Specify the WebSphere administrator as the administrator for the Active Directory forest domain.

    This domain must be the same as the one for which you created the authentication scheme in Step 1. To do this, specify values for the OB_WebPassADDomain parameter in the NetPointWASRegistry.properties file as described in Table 11-1.

    You can search for users in the parent domain but you cannot search for users in sibling or children domains.

    Note:

    You do not need to create an administrator for every domain in an Active Directory Forest.

11.13.2 Set Active Directory Domain in NetPointWASRegistry.properties

If you are running Active Directory using multiple domains, you must manually edit the NetPointWASRegistry.properties file to include a value for the OBWebPassADDomain parameter.

For example, OBWebPassADDomain=dc=xyz, dc=acme, dc=com

The domain must be the same as the domain defined for the default directory server in Oracle Access Manager.

See the Oracle Access Manager Identity and Common Administration Guide for more information.

#OB_UserAttr should be the Login Attribute example LoginID which is uid or genuserid.

11.14 Troubleshooting the Connector for WebSphere

The following is a list of the most frequently asked questions on the Connector for WebSphere. See also, "Troubleshooting the Connector for Portal Server v5".

Problem

When I try to enable administrative or application security, I receive the following error:

You must supply the primary administrative user name on the active registry or realm panels to enable security.

The server user ID or password is not specified. Enter a server user ID and password for the active user registry, or select to use the automatically generated server identity on the realm panel.

Solution

This message appears if you have not selected Standalone Custom Registry as the default realm when configuring the Secure Administration, Applications, and Infrastructure settings. See "To enable the NetPointWASRegistry in WAS 6.1" for details.

Problem

I am trying to conduct a search of users or groups using WAS role mapping. I am supplying a search string but I am getting an error message.

Solution

WAS role mapping requires wildcards in all search strings. Put an asterisk (*) at the beginning and the end of your search string, for example, a search of "*user123*" returns all user IDs that have "user123" as a substring.

Problem

I am locked out of WAS 5 Admin Console or the WebSphere 5 Server does not start after making a configuration change. What should I do?

Solution

Restore the previous WAS 5.0 security.xml file located in WAS_install_dir/config/cells/serverName directory. This assumes you have made a backup of an older, working copy.

Problem

On Solaris, when setting up the SSL connector for the Connector for WebSphere, why does the keytool command give a "Signature not available" error?

Solution

This is a jdk 1.2.x problem. Use the NT version or any other jdk1.3.x version to create the cert db (jssecacerts) and then use it with WebSphere on Solaris.

Problem

Why do I get "All the jars are not in classpath: NoClassDefException"?

Solution

Make sure that the NetPointWASRegistry.jar and jobaccess.jar are in the classpath.

Problem

Why do I get an SSLPeerUnverifiedException - peer not authenticated exception?

Solution

The jvm being used is different from the jvm that has imported the certificates of ca and server. The jvm and keytools used must be from the same installation. If one keytool is used to add certificates and java is invoked from the other installation directory, then the jvm will not be able to use the certificates and will produce this exception.

Problem

Why do I get "ObConfig.NO_CONFIG_FILE"?

Solution

his error means that the Access Manager SDK client configuration file is not found. Check the Install_Dir parameter in the NetPointWASRegistry.properties file and ensure that the following points to the NetPointWASRegistry installation directory. For example:

# Installation directory of NetPointWASRegistry OB_InstallDir=/CWS_install_dir/oblix/config/

Problem

Why do I get an UnsatisfiedLinkError?

Solution

You probably do not have the Access Manager SDK lib in the PATH or LD_LIBRARY_PATH depending on the platform.

For example:

Problem

Why do I get NoClassDefFound error for com.oblix.access.ObAccessException?

Solution

Make sure that the jobaccess.jar file is in WebSphere's classpath.

Problem

Why do I not see the ObSSOCookie being set?

Solution

Make sure that you are using fully qualified domain names to access the WebSphere Server and the Web server that is running WebGate.

For example, use:

http://foobar.oblix.com:9080

Not:

http://foobar:9080

Check the Cookie domain for the following:

Problem

I see the ObSSOCookie, but why is WebPass rejecting it?

Solution

Take the following steps:

Problem

Why is WebGate rejecting the ObSSOCookie?

Solution

Ensure that the IPValidation parameter is set to Off.

From the Access System Console, click Access System Configuration, click AccessGate Configuration in the left navigation pane, click the link for the WebGate that protects the WebPass, and in the IPValidation field select the Off option.

Problem

Why do IdentityXML calls fail with an unauthorized exception?

Solution

Check the NetPointWASRegistry.properties file to ensure that the WebPass host name is fully qualified.

For example:

OB_WebPassHost=foobar.oblix.com

OB_WebPassPort=80

Problem

Why do I get a "server specific error 10" while restarting the WebSphere Administrative Server.

Solution

Ensure all Java process are killed before re-starting the WebSphere Administration Server.

Problem

I see the following exception:

Exception in thread "main" com.ibm.websphere.security. CustomRegistryException: admin at com.oblix.registry.NetPointWASRegistry.getUserDisplayName(NetPointWASRegistry.java:622) at com.oblix.tools.registryTester.main(registryTester.java:69)

Solution

There can be many reasons for this exception. In the NetPointWASRegistry file, turn on the debug flag and check the debug log path as follows.

OB_LogLevel=debug

OB_LogFileName=/oblix/NetPointWASRegistry/log

Problem

I get the following error in the Oracle Access Manager log file:

Mon Jan 06 14:57:21 PST 2003: Error making SOAP request java.io.FileNotFoundException: http://cobalt.oblix.net:80/identity/oblix/apps/userservcenter/bin/ userservcenter.cgi at sun.net.www.protocol.http. HttpURLConnection.getInputStream(HttpURLConnection.java:529)
at com.oblix.soapclient.OblixSoapClient.doRequest(OblixSoapClient.java,Compiled Code) com.oblix.registry.NetPointWASRegistry.realGetUserDisplayName (NetPointWASRegistry.java:650)
at com.oblix.registry.NetPointWASRegistry.getUserDisplayName( NetPointWASRegistry.java:607) 
at com.oblix.tools.registryTester.main(registryTester.java,Compiled Code).

Solution

Ensure that the IPValidation parameter is set to Off.

From the Access System Console, click Access System Configuration, click AccessGate Configuration in the left navigation pane, click the link for the WebGate that protects the WebPass, and in the IPValidation field select the Off option.

Problem

I get the following error in the Oracle Access Manager log file:

Mon Jan 20 15:37:24 GMT-06:00 2003: Error making SOAP request java.io.IOException: Server returned HTTP response code: 401 for URL: http://foobar.oblix.com:80/identity/oblix/apps/userservcenter/bin/ userservcenter.cgi 
at sun.net.www.protocol.http.HttpURLConnection.getInputStream (HttpURLConnection.java:604) 
at com.oblix.soapclient.OblixSoapClient.doRequest(OblixSoapClient.java:285)

Solution

Be sure that the IPValidation parameter for the WebGate is set to Off.

From the Access System Console, click Access System Configuration, click AccessGate Configuration in the left navigation pane, click the link for the WebGate that protects the WebPass, and in the IPValidation field select the Off option.

Problem

I get the following exception: "com.ibm.ejs.exception.InvalidUserRegistryConfigException: User [username] not authenticated"?

Solution

Make sure the OB_UserAttr, OB_UserSearchAttr and OB_GroupSearchAttr are set correctly in NetPointWASRegistry.properties.

OB_UserAttr=samaccountname

OB_UserSearchAttr=cn

OB_GroupSearchAttr=cn

Problem

I get the following error in the Oracle Access Manager log file:

java.lang.StringIndexOutOfBoundsException: String index out of range: -10 at java.lang.String.substring(String.java(Compiled Code)) at com.oblix.soapclient.OblixSoapClient.handleSoapResponse(OblixSoapClient.java:345) at com.oblix.soapclient.OblixSoapClient.doRequest(OblixSoapClient.java:297) at com.oblix.registry.NetPointWASRegistry.realGetUserDisplayName (NetPointWASRegistry.java:650) 
at com.oblix.registry.NetPointWASRegistry.getUserDisplayName (NetPointWASRegistry.java:607) 
at com.oblix.registry.NetPointWASRegistry.getUniqueUserId (NetPointWASRegistry.java:680) 
at com.ibm.ejs.security.registry.CustomRegistryImpl.createCredential (CustomRegistryImpl.java:698) 
at com.ibm.ejs.security.registry.CustomRegistryImpl.authenticate (CustomRegistryImpl.java:166) 
at com.ibm.ejs.security.registry.RegistryBean.authenticate (RegistryBean.java:109) at
com.ibm.ejs.security.registry.EJSRemoteStatelessRegistry.authenticate(EJSRemoteStatelessRegistry.java:25) at com.ibm.ejs.security.registry._Registry_Stub.authenticate(_Registry_Stub.java:275) at com.ibm.ejs.security.ltpa.LTPAServerObject.authenticate(LTPAServerObject.java:97) at com.ibm.ejs.security.util.LTPAAuthenticationCache.update(LTPAAuthenticationCache.java:167) at com.ibm.ejs.security.util.Cache.get(Cache.java:114) at com.ibm.ejs.security.util.LTPAAuthenticationCache.getCredential(LTPAAuthenticationCache.java:82) at com.ibm.ejs.security.SecurityServerBean.authenticateBasicAuthData(SecurityServerBean.java:145) at com.ibm.ejs.security.EJSRemoteStatelessSecurityServer.authenticateBasicAuthData(EJSRemoteStatelessSecurityServer.j ava:49) at com.ibm.ejs.security._SecurityServer_Stub.authenticateBasicAuthData(_SecurityServer_Stub.java:281) at com.ibm.WebSphereSecurityImpl.SecurityServerImpl.authenticateBasicAuthData(SecurityServerImpl.java:69) at com.ibm.ISecurityLocalObjectLTPAImpl.PrincipalAuthenticatorImpl.authenticate(PrincipalAuthenticatorImpl.java:437) at com.ibm.ISecurityLocalObjectBaseL13Impl.LoginHelperImpl.request_login_controlled(LoginHelperImpl.java:1092) at com.ibm.ISecurityLocalObjectBaseL13Impl.LoginHelperImpl.request_login_controlled(LoginHelperImpl.java:827) at com.ibm.ISecurityLocalObjectBaseL13Impl.CredentialsImpl.get_mapped_credentials(CredentialsImpl.java:1206) at com.ibm.ISecurityLocalObjectBasicAuthImpl.CredentialsImpl.get_mapped_credentials(CredentialsImpl.java:188) at com.ibm.ISecurityLocalObjectBaseL13Impl.VaultImpl.setServerCred(VaultImpl.java:3862) at com.ibm.ISecurityLocalObjectBaseL13Impl.PrincipalAuthenticatorImpl.setServerCred(PrincipalAuthenticatorImpl.java:9 79) at com.ibm.ISecurityLocalObjectLTPAImpl.PrincipalAuthenticatorImpl.authenticate(PrincipalAuthenticatorImpl.java:302) at com.ibm.ISecurityLocalObjectBaseL13Impl.LoginHelperImpl.request_login_controlled(LoginHelperImpl.java:1092) at com.ibm.ISecurityLocalObjectBaseL13Impl.LoginHelperImpl.request_login_controlled(LoginHelperImpl.java:827) at com.ibm.ISecurityLocalObjectBaseL13Impl.CredentialsImpl.get_mapped_credentials(CredentialsImpl.java:1206) at com.ibm.ISecurityLocalObjectBasicAuthImpl.CredentialsImpl.get_mapped_credentials(CredentialsImpl.java:188) at com.ibm.ejs.security.SecurityCollaborator.getActualCredential(SecurityCollaborator.java:999) at com.ibm.ejs.security.SecurityContext.getActualCreds(SecurityContext.java:75) at com.ibm.ejs.security.Initializer.bindServerIdToAdminApp(Initializer.java:458) at com.ibm.ejs.security.Initializer.initialize(Initializer.java:217) at com.ibm.ejs.security.Initializer.serverStarted(Initializer.java:133) at com.ibm.ws.runtime.Server.fireServerStarted(Server.java:2001) at com.ibm.ws.runtime.Server.fireServerStarted(Server.java:1994) at com.ibm.ejs.sm.server.AdminServer.initializeRuntime0(AdminServer.java:1144) at com.ibm.ws.runtime.Server.initializeRuntime(Server.java:884) at com.ibm.ejs.sm.server.AdminServer.main(AdminServer.java:392) at java.lang.reflect.Method.invoke(Native Method) at com.ibm.ws.bootstrap.WSLauncher.main(WSLauncher.java:158)

Solution

Make sure the Identity Server is up and running.

Problem

Why does the Portal Server allow logins with old passwords even though it honors passwords updated through Oracle Access Manager?

Solution

Because the Portal Server installation sets the Security Cache Timeout to 600 seconds, old passwords will be stored in cache for that amount of time. This parameter is present in the WebSphere Application Server Administrative Console - Security Center and under the General tab.

Problem

A deactivated Oracle Access Manager user can still access WebSphere resources.

Solution

To avoid this, ensure that all authentication schemes that WebSphere uses have the following lines added:

(|(!(obuseraccountcontrol=*))(obuseraccountcontrol=ACTIVATED))

Problem

Why does the WebSphere Portal Server not come up, resulting in security exceptions?

Solution

Ensure that the LPTA Token domain is set up correctly.

Problem

Single sign-on is not working when a URL resource is protected with a Basic Over LDAP authentication scheme, even though TAI is enabled.

Solution

Verify the you followed the steps described in "Configuring the TAI for WebSphere v5", and that you have set the challenge re-direct field in the Basic Over LDAP authentication scheme.

Problem

The following error appears in the Event Viewer of the WebSphere Administrative Console:

CNTR0020E: Non-application exception occurred while processing method isAllLevelNone on bean BeanId(admin#repository.jar#PmiService, null):javax.transaction.TransactionRolledbackException: CORBA TRANSACTION_ROLLEDBACK 0 No; nested exception is:
org.omg.CORBA.TRANSACTION_ROLLEDBACK: minor code: 0 completed: No
org.omg.CORBA.TRANSACTION_ROLLEDBACK: minor code: 0 completed: No
at com.ibm.ejs.jts.jts.JBrokerSupport$RI.client_unmarshalled_reque st (JBrokerSupport.java:405)
at com.ibm.CORBA.iiop.RIs.iterateClientRequestPreRIs(RIs.java (Compiled Code))
at com.ibm.CORBA.iiop.ClientRequestImpl.reInvoke (ClientRequestImpl.java:851)
at com.ibm.CORBA.iiop.ClientDelegate.invoke (ClientDelegate.java:894)
at com.ibm.CORBA.iiop.ClientDelegate.invoke (ClientDelegate.java:409)
at org.omg.CORBA.portable.ObjectImpl._invoke (ObjectImpl.java:258)
at com.ibm.ejs.sm.agent._AdminAgent_Stub.invokeActiveObject (_AdminAgent_Stub.java:39)

Solution

This may occur if the WebSphere Application Server startup time is long. There can be multiple reasons for this problem, including a startup servlet (load-on-startup = true) which requires long time performing the init() method for the servlet.

If the Ping Initial Timeout is set to a value lower than the amount of time needed for the App Server to start, the Ping Initial Timeout alarm expires before the App Server could come up fully and send the "serverIsAlive" message. As a result, the administration server tries to kill and restart the Application Server process. In this situation, the state of the clone is recorded as Running.

The PMI client indicates that the clone is up and running and tries to invoke the "isAllLevelNone" method on the clone. Because the clone does not exist, it fails with an error message.

To correct this, set the Ping Initial Timeout to a larger number to allow the Application Server to start completely.

Problem

After enabling security and configuring LDAP as the Authentication Mechanism, the administration server restarts, the following errors show in the trace file:

[02.03.21 08:37:59:957 CST] 4be2cc Initializer W SECJ0007E: Error during security initializationjava.lang.NullPointerException at com.ibm.ejs.security.ltpa.LTPAPrivateKey.decode(LTPAPrivateKey.java:50) at com.ibm.ejs.security.ltpa.LTPAPrivateKey.<init>(LTPAPrivateKey.java:40) at com.ibm.ejs.security.ltpa.LTPAServerBean.updateAll(LTPAServerBean.java:106) at com.ibm.ejs.security.Initializer.updateActiveLtpaConfig(Initializer.java:392) at com.ibm.ejs.security.Initializer.propagateSecurityConfig(Initializer.java:296) at com.ibm.ejs.security.Initializer.initialize(Initializer.java:173) at com.ibm.ejs.security.Initializer.serverStarted(Initializer.java:129) at com.ibm.ws.runtime.Server.fireServerStarted(Server.java:1977) at com.ibm.ws.runtime.Server.fireServerStarted(Server.java:1970) at com.ibm.ejs.sm.server.AdminServer.initializeRuntime0(AdminServer.java:1123) at com.ibm.ws.runtime.Server.initializeRuntime(Server.java:882) at com.ibm.ejs.sm.server.AdminServer.main(AdminServer.java:391) at java.lang.reflect.Method.invoke(Native Method) at com.ibm.ws.bootstrap.WSLauncher.main(WSLauncher.java:158)[02.03.21 08:38:00:001 CST] 4be2cc Server A WSVR0023I: Server __adminServer open for e-business

Solution

Sometimes the key and password get out of sync. Create a new key for WebSphere's use.

To create a new key, do as follows:

  1. From the Security Center (4.0x) or the Global Security Wizard (3.5x) under the Authentication Tab, click Generate Keys.

  2. At the prompt, enter a password for the new key.

Problem

A user's attempt to log in to the WebSphere Administrative Console results in the following error:

ADGU2009E: Security Error: Either username/password is wrong or this user is not authorized to connect to admin server.

Solution

Only the following users can log in to the WebSphere Administrative Console when security is enabled:

Problem

I get a Not Authorized error when I try to access a WAS resource or a WebSphere Portal resource.

Solution

You get this error because the ObSSOCookie is not being sent. Refresh the page to send the ObSSOCookie.

It is recommended that you use a form-based authentication scheme to avoid this problem. If you use the basic authentication scheme, set the Challenge Redirect field to another WebGate to ensure that the ObSSOCookie gets sent.

Problem

If TAI is failing with a stack trace:

... 1493ff35 JaasLoginHelp E SECJ4001E: Login failed for testeisintuser/Default Realm ....

You get this error because the ObSSOCookie is not being sent.

Solution

Do the following:

  1. Refresh the page to send the ObSSOCookie.

  2. Enable further security debugging for the following classes:

    com.ibm.ws.security.*

    com.ibm.websphere.security.*

    com.ibm.WebSphereSecurityImpl.*

    SASRas

  3. To view detailed information on the runtime behavior of security, enable trace on the following components and review the output:

    com.ibm.ws.security.*=all=enabled:com.ibm:WebSphereSecurityImpl.*=all=enabled:com.ibm.websphere.security.*=all=enabled.

    This trace statement collects the trace for the security runtime:

    com.ibm.ws.console.security.*=all=enabled.

    This trace statement collects the trace for the security center GUI.

    SASRas=all=enabled.

    This trace statement collects the trace for SAS (low-level authentication logic):

    The logs should give better debugging messages, and ideas on what exactly is failing.

Problem

Error in the TAI logs:

Error no action found

Solution

Ensure that the Authentication Scheme level for the Authentication scheme protecting the WebSphere Policy (Authen/Basic) is less than or equal to the Authentication scheme level protecting the WebSphere resource.

Ensure that the WAS_REGISTRY action is set properly (see "Defining a Policy Domain for WebSphere"). Ensure that there is an Authorization Expression set and that upon Authorization success the WAS_REGISTRY action is set.

Problem

WAS Registrytester.bat may fail:

System variables may be picking up an older version of obaccess.dll based on the path.

Solution

Check your system variables to ensure these are correctly set. For example, $PATH and $CLASSPATH must be correctly set.

Problem

Unable to search users in the WebSphere Portal Admin page.

Solution

Do the following:

  1. Log in as wpsadmin and go to Portal Administration, Security, Access Control List.

  2. Click Get groups and users. Search for users using the wildcard character "*" and select wpsadmin and add it to the list, then click OK.

  3. Select user groups in the Select the objects for the permissions for the user wpsadmin, then click Go.

  4. Give Manage permissions for the group All authenticated users for user wpsadmin, then click Save.

  5. Go to Users and Groups, Manage Users, then search for users using the wildcard character "*." to display all the users.

  6. To view groups, repeat steps a, b, and c, then give Manage permissions for each group that needs to be viewed for wpsadmin and click Save

Problem

IBM WebSphere Portal Server gives an error "No Portlets to display"

Solution

Do the following:

  1. Log in to WebSphere Administrative Console. Navigate to WebSphere Portal application.

  2. Click the JVM settings tab and add the following to the System Properties"

    "HttpSession.RecurseThroughProxy", value = "true"

  3. Restart the WebSphere Portal application.

11.14.1 Troubleshooting the Connector for Portal Server v5

The following Portal Server v5 issues are covered:

11.14.1.1 Portal Server v5 Installation-Related Issues

There are several Portal Server installation-related issues that you may encounter. See the following problem and solution descriptions.

Problem

Both the WebSphere AppServer and Portal Server installed successfully but not able to access Portal Server page i.e. wps/portal.

Solution

Check for the fix packs needs to be applied on Application Server for the respective Portal Server version integration. The order to apply fix packs is important.

For Example, In case of Application Server 5.0 and Portal Server 5.0, the Fix Pack 1 needs to be applied on WebSphere Application server. The order of applying patch would be,

  • Wasfp1

  • Pmefp1

  • Fixes

  • Manualfixes

You can check $WAS_install_dir/properties/version/history folder to confirm the list of fixes applied on Application server.

For more information on this, see the WebSphere Portal infocenter document available on the IBM WebSphere site.

Problem

On login to the Portal Server (wps/portal), the following error message displayed:

There has been an application error! Please contact to your system administrator to report this error.

Solution

Ensure the required fix pack has been applied on the Application Server. See the first problem in this section. Also, ensure the Java 2 security is disabled in the WebSphere Application server.

To disable Java 2 security

  1. Login into WebSphere Application Server Console, Security, Global Security.

  2. Disable the check box for the Enforce Java 2 Security option.

  3. Save the changes, then restart both the WebSphere Application Server and Portal Server.

    Note:

    It is recommended that you install Portal Server with disabling Global Security in WebSphere Application server.

Problem

On successful login to the Portal Server, the Portal Admin is not able to view the Administration link to manage the Portal Server. This link is displayed on the top-right side of the page.

The Administration portlet is not deployed on the system.

Solution

Do the following:

  1. Run WPSconfig.{bat | sh} portlets script to deploy the same.

    This script is available in $WPS_install_dir/config folder. For more information check the wpsconfg.xml file.

  2. Restart the Portal Server and login using admin credentials.

    The Portal Admin user will able to see the "Administration" link and he can setup the Portal Server Application.

  1. Note:

    The same script will also deploy some sample portlet applications come along with Portal Server installation. Also, WPS_install_dir is the directory where the Portal Server is installed.

Problem

On successful login to the Portal Server, Portal Admin is not able to view a portlet page. The error message appears as:

There is no content available. Please check if there is content defined for the markup of your client device.

This message comes because portal page is not created in the Portal Server.

Solution

A page has to be created in the Portal Server so you can add portlets on this page.

To add a page, you need page addition/modification privileges and a portlet needs to be installed that adds a new page or edits a page.

See issue 3 to check whether the required portlet has been deployed on the system.

Problem

When searching users from the Portal Server "user search" interface you may get empty records as a search result. This problem occurs when user names stored in the directory server are in Latin ISO-8859-1 style.

Solution

Ensure that you unset the following environment variables.

unset LC_COLLATE LC_CTYPE LC_MESSAGES LC_MONETARY LC_NUMERIC LC_TIME

11.14.1.2 Custom Security Integration Related Issues

The following issues are related to custom security integration.

Problem

Portal Server configuration has been done for a custom member repository (WAS Connector) but the user is still not able to log in into the Portal Server using Custom Data Store user id, that is, the user is present in Oracle Access Manager.

Solution

Check $WPS_install_dir\shared\app\wmm\ wmm.xml file. Confirm that ProfileRepository tag has been configured correctly for Custom Member Repository implementation.

Sometimes WPSconfig script execution modifies wmm.xml file and LDAP settings replace custom member repository settings.

Note:

Oracle recommends that you always keep backup of wmm.xml file configured for Custom Member Repository.

Problem

Portal Admin is able to search for the user present in Custom Data Store but on assigning him a portlet access permission, that user is not able to view the portlet after successful login.

This problem occurs when user DN present in the Custom Data Store contains intermediate spaces.

For Example, cn=Portal User, o=company, c=us.

WebSphere Portal does normalization of DN before matching it with the allowed user DN present in its internal cloudscape database. As string entries do not match, access permissions to the user fails.

Solution

To overcome this problem, apply Fix Pack PQ93461 provided by IBM.

Problem

How can I retrieve only the first 10 entries (or the number of entries I want to retrieve) on a search for an Identity system user or group through the Portal Server.

Solution

he parameter of number of records to retrieve is configurable in NetpointWASRegistry.properties file.

The name of parameter is OB_WebPassXPIRecordsReturned.

If this parameter is not defined or set to zero then it will retrieve all the users or groups present in the Oracle Access Manager Repository.

Problem

Portal Admin user is not able to install a portlet.

This problem is related to invalid deployment credentials in Portal Server.

Solution

Verify that WPSConfig.{bat/sh} action-create-deployment-credentials script has been executed or not.

This script execution creates required Credential Vaults in portal server.

Before execution of this script, verify wpsconfig.properties file. Check values of all the configuration parameters mentioned in the Oracle Access Manager Installation Guide.

Also verify that $WPS_install_dir\ shared\app\config\services\VaultService.properties contains correct systemcred.dn value. This should be Portal Admin User DN.

After successful execution verify that the credentials vaults has been created for the Portal Server.

You can check the same from Portal Server Login, Administration, Access, Credential Vault, Manage System Vault Slots.

Problem

How can I get the debug logs of the Oracle Access Manager WAS Registry and CMR?

Solution

For WAS Registry logs, set the following parameters of NetpointWasRegistry.properties file:

OB_LogLevel=debug

OB_LogFileName=log file complete path

For enabling CMR logs and Portal Server logs set the following parameters in $WPS_install_dir\ shared\app\config\log.properties file.

traceString=*=all=enabled

com.ibm.wps.services.puma.*=all=enabled:

com.ibm.wps.puma.*=all=enabled:

com.ibm.wps.command.puma.*=all=enabled:

com.ibm.wps.engine.commands.*=all=enabled:

com.ibm.wps.services.authentication.*=all=enabled:

com.ibm.ws.security.*=all=enabled:

com.ibm.websphere.security.*=all=enabled

All the puma services logs will be generated in the "Trace.log" file.

Refer Portal Server infocenter document for more details on turning on logs.

Problem

How can I stop/start WebSphere Application Server and Portal Server?

Solution

To start and stop Application Server use

  • Run the startServer command, as follows:

    $WAS_install_dir/bin/startServer name_of_app_server

    (Default name is server1)

  • Run the stopServer command, as follows:

    $WAS_install_dir/bin/stopServer name_of_app_server -username WAS_Admin_userid -password WAS_Admin_Pwd

To start and stop Portal Server use

  • Run the startServer command, as follows:

    $WAS_install_dir/bin/startServer name_of_portal_server

    (Default name is WebSphere_Portal)

  • Run the stopServer command, as follows.

    $WAS_install_dir/bin/stopServer name_of_portal_server -username PortalAdmin -password PortalAdminPwd

Problem

Portal Admin is not able to search the users present in the Oracle Access Manager Repository but these users are able to log in into the Portal Server.

Solution

Solution: Check the user.fbadefault.filter parameter in the PumaService.properties file. This parameter should contain the attribute name, which is passed to the custom CMR implementation. The WAS Connector uses this attribute to ensure the Portal Admin user is a valid user.

Check the trace.log file for exception details.

Problem

While starting the Portal Server, the CMR gets invalid Portal Administrator credentials.

Solution

Run the Wpconfig. {bat/sh} action-secure-portal-ldap script from the $WPS_install_dir/config folder.

Problem

Why am I unable to install a portlet using the administrator ID with Oracle Access Manager security enabled?

Solution

Solution: Complete the following steps to ensure that the proper credentials are being used.

  1. Verify that the correct values for WasUserid and WasPassword are present in the following file:

    wpconfig.properties

    WasUserid must be the administrative user id and not the administrative DN. As necessary, use any plain-text editor to open wpconfig.properties and correct the values for WasUserid and WasPassword. Save and close wpconfig.properties.

  2. Confirm that you have executed the following command:

    wpconfig.bat\.sh action-create-deployment-credentials

    If you discover that you have not run the command, execute it, then proceed with portlet installation.

    If you discover that you previously ran the script using incorrect values for WasUserid or WasPassword, correct the invalid values by executing the following two commands:

    wpconfig.bat\.sh action-remove-deployment-credentials

    wpconfig.bat\.sh action-create-deployment-credentials

  3. Verify that the administrator id is defined correctly by navigating to Portal Administration, Access, Credential Vaults, Manage system vault slots, deployment.user.Vault.

Problem

For WebSphere 6.0, no users are returned when a search is conducted through the WebSphere Application Server Administration Console.

Typically, the Oracle Access Manager log will contain an error message that begins with the following:

Error making SOAP request . . .

Solution

Make sure that $LANG and all $LC_* variables are set to en-US. You can check the current values of these variables through the "locale" command on SLES 9.

Problem

The Client Cert Authentication feature for the WebSphere Application Server 6.0 is unable to access the Snoop applet on the https port of the Web server.

Solution

Ensure that the SSL port used by the Web server has been added to the "default_host" virtual host configuration on the Application Server. If it does not exist, perform the following steps:

  1. Launch the WebSphere Administration Console.

  2. Navigate to Environment, Virtual Hosts, default_host, host aliases.

  3. Add the hostname * Port: 443 (This is the SSL port used by the Web server).

  4. Save your changes.

  5. Regenerate the plugin by completing the following steps:

    1. Navigate to Servers, Web servers.

    2. Select the Web server for which you will create the plugin.

    3. Select Generate Plugin.

      You can view the generated plugin by navigating to: WebServerName, plugin properties, View, PlugInFileName.

    4. Restart the Web server.

  6. To verify that the SSL port is operational, complete the following steps:

    1. Disable the Access System policy protecting the test resource.

    2. Attempt to access the test resource using WebSphere Authentication exclusively.

      Use the following URL:

      https://WebServerHostMachineName:sslPortNumber/snoop

    3. If this succeeds, re-enable the Access System policy.