SlideShare a Scribd company logo
“Secure Portal” or
WebSphere Portal – Security with Everything
Dave Hay
Portal Architect
IBM Software Services for Lotus
david_hay@uk.ibm.com

18 March 2010
Agenda

●   Definition of Terms
●   Moving away from the “Out Of The Box” experience
●   Federated Repositories
●   Custom User Registry
●   Authentication against a Corporate Directory
●   Authorisation and Personalisation via LDAP and Property Extension
    Database
●   Desktop Single Sign-On in a Microsoft environment
●   Back-end SSO – in an all-IBM world
●   Back-End SSO – Using a Reverse Web Proxy server
●   Back-end SSO – Asserting identity in an open world
●   Further Reading



                                  2
Portal Operational Model
(Production)

                                                                           Cluster
                                                                           Manager



                          Web     Delivery    Content
                         Server    Portal    Rendering




     Site      Load
    Visitor   Balancer                                   Content / Portal Content / Portal
                                                           Database         Database


                                  Delivery    Content
                          Web      Portal    Authoring
                         Server

                                  Cluster     Cluster




                                                                 User           User
                                                               Directory      Directory



                                   3
Definition of Terms
●   WebSphere Application Server (WAS)
●   WebSphere Portal (WP)
●   Authentication vs. Authorisation vs. Personalisation
●   Property Extension Database ( aka LookAside )
●   Virtual Member Manager (VMM)
●   WebSphere Identity Manager (WIM)
●   Custom User Registry (CUR)
●   Trust Association Interceptor (TAI)
●   Lightweight Third Party Authentication (LTPA)
●   Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO)
●   Security Assertion Markup Language (SAML)
●   Kerberos
●   Shibboleth




                                          4
Authentication etc.




      5
Moving away from the “Out Of The Box”
experience
●   Portal automatically secured against WAS via WIM File System
    Repository
●   Optional during WAS installation; default during WP installation
●   Provides basic identity, profile and user information
●   Simple to manage via WAS/WP user interface and Java/API
●   Unwieldy – all user/group management is only via WAS/WP, and not
    easily accessible to back-end systems without coding
●   Portal security cannot “reach out” to back-end resources e.g. no SSO




                                   6
Federated Repositories

●   WAS/WP 6.1 and beyond
●   Provides support for multiple user repositories, including WIM ( File
    System ), LDAP, databases etc.
●   Useful for multiple user communities and use cases e.g. intranet and
    internet and extranet
●   Fits well with virtualization e.g. Virtual Portal
●   Needs careful planning and consideration e.g. user/group filters,
    realms, Single Sign-On domains,unique user identities etc.




                                   7
Custom User Registry

●   An option for authentication where requirements dictate non-LDAP
    approach
●   Requires custom development
●   Good solution for certain use cases e.g. back-end application
    integration, delegation of user access and management to corporate
    systems
●   Examples of implementation include using mainframe-based application
    via CUR




                                 8
Authentication against a Corporate
Directory
●   Supported LDAPs
    Lotus Domino
    Microsoft Active Directory
    Tivoli Directory Server
    Novell eDirectory
    Sun ONE Directory Server
●   Supported vs. tested vs. unsupported
●   Read-only vs. Read/Write
●   Security Wizard
●   Alternative Security Tasks ( ConfigEngine )
●   Can be used stand-alone or as part of Federated Repository solution




                                  9
Authorisation and Personalization via
LDAP and Property Extension Database
●   Describe how LDAP groups and attributes can be used to provide
    authorisation and personalized access to portal resources
●   Authorisation and Personalization can be two sides of the same coin;
    both can be used to change the user experience based upon external
    attributes
●   Authorization – where can I go now I'm in the portal ?
●   Personalization – what can I see ?
●   Authorisation – typically related to security e.g. permissions, user
    groups, roles etc.
●   Personalization – typically related to attributes, events, user profile
    choices
●   Customization – typically user controlled rather than externally
    influenced



                                   10
Single Sign-On




     11
SSO Domain Concepts




                12
Desktop Single Sign-On in a Microsoft
environment
●   Provides seamless SSO to users once Windows login has completed
●   Requires Portal to use same Active Directory domain as user's
    Windows desktops
●   SPNEGO is used to negotiate the authentication protocol between
    client and server, using Kerberos
●   Works with Internet Explorer and Firefox
●   Active Directory and Kerberos ( Key Distribution Centre ) needs to be
    configured
●   WebSphere Trust Association Interceptor (TAI) provided in WAS 6.1
    and beyond
●   WAS needs to be configured
●   User browsers need to be configured
●   No longer requires front-end IIS server


                                   13
SPNEGO/Kerberos/AD implementation




                 14
Back-end SSO – in an all-IBM world
●   Appropriate for requirements where back-end applications support the
    IBM Lightweight Third Party Authentication (LTPA) mechanism
●   Examples include: -

    WebSphere Application Server
    WebSphere Portal
    Lotus Connections
    Lotus Domino
    Lotus Quickr
    Lotus Sametime
●   LTPA token generated by server following initial successful
    authentication; stored as cookie in browser
●   Used to provide authentication to trusted servers; those participating in
    the same SSO environment (DNS domain) and sharing a common
    LTPA private key ( encrypted )




                                    15
Back-End SSO – Using a Reverse Web
Proxy server
●   Examples are Tivoli Access Manager for e-Business (TAMeB) and Siteminder
●   IBM experiences tend towards TAMeB but Siteminder info is available
●   WebSEAL is the TAMeB web reverse proxy solution
●   WebSEAL intercepts all requests for secured, back-end web applications
●   Hides application URLs etc. from end-users increasing security
●   Authentication and authorisation ( to access web app. or not ) is made in
    WebSEAL
●   If auth/auth sucessful, WebSEAL passes request to WAS/Portal
●   TAI deployed in WAS to support this delegated authentication
●   Junctions ( transparent or otherwise ) created in WebSEAL for Portal
●   LTPA cookie is generated by WebSEAL junction and stored in user's browser,
    giving onwards SSO




                                       16
TAM-eB Reference Architecture




                  17
TAMeB implementation
                      1  An unauthenticated client issues a
                         request.
                      2 WebSEAL issues an HTTP authentication
                         challenge.
                      3 Client responds to challenge.
                      4 WebSEAL authenticated user against
                         user registry.
                      5 WebSEAL modifies the Header to include
                         (iv_creds, …)
                      6 Request to WAS where TAI performs
                         authentication of tai_user
                      7 User credentials are extracted from
                         header to construct a user principal.
                      8 WAS sends the request the Portal
                      9 Portal sends the Output to WebSEAL
                      10 WebSEAL dispatches the output to the
                         client.




                 18
Back-end SSO – Asserting identity in an
open world
●   Requirement where SSO is required from WebSphere to an external
    service
●   Can potentially be used in reverse using custom TAI – not supported by
    IBM
●   Necessary to “prove” that WebSphere user has been authenticated
●   Open-standard mechanism for the assertion of the user's identity, with
    implicit trust and security ( SAML )
●   SAML works by way of a paired set of servers – Identity Provider (IdP)
    and Service Provider (SP)
●   Various implements of SSO via SAML including Shibboleth and Tivoli
    Federated Identity Manager (TFIM)
●   Some entitlement to TFIM with WAS Network Deployment

    http://www-01.ibm.com/software/tivoli/products/federated-identity-mgr-websphere/index.html



                                               19
Shibboleth implementation
                       1)   The User attempts to access a Shibboleth-protected
                            resource on the Service Provider site.

                       2)   The User is redirected to the federation WAYF.

                       3)   The User select his or her home institution (*Identity
                            Provider) from the list presented by the WAYF.

                       4)   The Identity Provider, by whatever means it deems
                            appropriate, ensures that the User is authenticated.

                       5)   After successful authentication, a one-time Handle
                            (session identifier) is generated for this User session
                            and is sent to the Service Provider.

                       6)   The Service Provider uses the Handle to request
                            attribute information from the Identity Provider for this
                            User.

                       7)   The Identity Provider, on the basis of its Attribute
                            Release Policy, allows or denies attribute information
                            to be made available to this Service Provider.

                       8)   Based on the attribute information made available to
                            it, the Service Provider allows or refuses the User
                            access to the resource.




                  20
Further Reading
IBM WebSphere Application Server V6.1 Security Handbook

   http://www.redbooks.ibm.com/abstracts/sg246316.html?Open

IBM WebSphere Application Server V7.0 Security Guide

         http://www.redbooks.ibm.com/abstracts/sg247660.html

WebSphere Portal Family Wiki

         http://www-10.lotus.com/ldd/portalwiki.nsf

Tivoli Access Manager for e-Business

         http://www-01.ibm.com/software/tivoli/products/access-mgr-e-bus/

Tivoli Federated Identity Manager

   http://www.ibm.com/software/tivoli/products/federated-identity-mgr




                                                21
Any Questions ?




     22
Ad

More Related Content

What's hot (20)

Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
CA Technologies
 
vCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep divevCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep dive
fbuechsel
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren Shah
NSConclave
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
Manish Harsh
 
OpenSSO Tech Overview Aquarium
OpenSSO Tech Overview AquariumOpenSSO Tech Overview Aquarium
OpenSSO Tech Overview Aquarium
Eduardo Pelegri-Llopart
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
Harihara sarma
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?
rlsoft
 
Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0
Vladimir Dzhuvinov
 
WildFly & WildFly Swarm
WildFly & WildFly SwarmWildFly & WildFly Swarm
WildFly & WildFly Swarm
Dimitris Andreadis
 
4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010
Fabrizio Volpe
 
Identity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethIdentity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and Shibboleth
Andrew Petro
 
Java™ in Web 2.0
Java™ in Web 2.0Java™ in Web 2.0
Java™ in Web 2.0
elliando dias
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11
Niit Care
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing on
guest648519
 
Security Avalanche
Security AvalancheSecurity Avalanche
Security Avalanche
Michele Leroux Bustamante
 
SINGLE SIGN-ON
SINGLE SIGN-ONSINGLE SIGN-ON
SINGLE SIGN-ON
Shambhavi Sahay
 
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLAlfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
J V
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
Brian Culver
 
jboss.org-jboss.com
jboss.org-jboss.comjboss.org-jboss.com
jboss.org-jboss.com
Dimitris Andreadis
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
Devam Shah
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
CA Technologies
 
vCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep divevCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep dive
fbuechsel
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren Shah
NSConclave
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
Manish Harsh
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
Harihara sarma
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?
rlsoft
 
Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0
Vladimir Dzhuvinov
 
4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010
Fabrizio Volpe
 
Identity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethIdentity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and Shibboleth
Andrew Petro
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11
Niit Care
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing on
guest648519
 
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLAlfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
J V
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
Brian Culver
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
Devam Shah
 

Similar to “Secure Portal” or WebSphere Portal – Security with Everything (20)

59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
DeepakAC3
 
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise UsersApache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
DataWorks Summit
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
Michael Noel
 
NIC - Windows Azure Pack - Level 300
NIC - Windows Azure Pack - Level 300NIC - Windows Azure Pack - Level 300
NIC - Windows Azure Pack - Level 300
Kristian Nese
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG Hackathon
Ki-Eun Shin
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Michael J Geiser
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
Novell
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Michael Noel
 
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Michael Collier
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
Tobias Koprowski
 
Oracle web center
Oracle web centerOracle web center
Oracle web center
East Le
 
WebSphere Portal Technical Overview
WebSphere Portal Technical OverviewWebSphere Portal Technical Overview
WebSphere Portal Technical Overview
Vincent Perrin
 
Integrated Services for Web Applications
Integrated Services for Web ApplicationsIntegrated Services for Web Applications
Integrated Services for Web Applications
Saltmarch Media
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
ForgeRock
 
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
ukdpe
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
WSO2
 
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
Michael Noel
 
Skype for business mobility
Skype for business mobilitySkype for business mobility
Skype for business mobility
Fabrizio Volpe
 
Web servers
Web serversWeb servers
Web servers
Mohamed Zeinelabdeen Abdelgader Farh jber
 
Api management update for optus
Api management update for optusApi management update for optus
Api management update for optus
sflynn073
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
DeepakAC3
 
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise UsersApache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
DataWorks Summit
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
Michael Noel
 
NIC - Windows Azure Pack - Level 300
NIC - Windows Azure Pack - Level 300NIC - Windows Azure Pack - Level 300
NIC - Windows Azure Pack - Level 300
Kristian Nese
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG Hackathon
Ki-Eun Shin
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Michael J Geiser
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
Novell
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Michael Noel
 
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Michael Collier
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
Tobias Koprowski
 
Oracle web center
Oracle web centerOracle web center
Oracle web center
East Le
 
WebSphere Portal Technical Overview
WebSphere Portal Technical OverviewWebSphere Portal Technical Overview
WebSphere Portal Technical Overview
Vincent Perrin
 
Integrated Services for Web Applications
Integrated Services for Web ApplicationsIntegrated Services for Web Applications
Integrated Services for Web Applications
Saltmarch Media
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
ForgeRock
 
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 1
ukdpe
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
WSO2
 
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
Michael Noel
 
Skype for business mobility
Skype for business mobilitySkype for business mobility
Skype for business mobility
Fabrizio Volpe
 
Api management update for optus
Api management update for optusApi management update for optus
Api management update for optus
sflynn073
 
Ad

More from Dave Hay (7)

Suppressing http headers from web sphere application server
Suppressing http headers from web sphere application serverSuppressing http headers from web sphere application server
Suppressing http headers from web sphere application server
Dave Hay
 
Installing web sphere application server v7 on red hat enterprise linux v6.3
Installing web sphere application server v7 on red hat enterprise linux v6.3Installing web sphere application server v7 on red hat enterprise linux v6.3
Installing web sphere application server v7 on red hat enterprise linux v6.3
Dave Hay
 
Dave hay web sphere administration for domino administrators
Dave hay   web sphere administration for domino administratorsDave hay   web sphere administration for domino administrators
Dave hay web sphere administration for domino administrators
Dave Hay
 
Dave hay desktop single sign-on in an active directory world
Dave hay   desktop single sign-on in an active directory worldDave hay   desktop single sign-on in an active directory world
Dave hay desktop single sign-on in an active directory world
Dave Hay
 
Dave hay desktop single sign-on in an active directory world
Dave hay   desktop single sign-on in an active directory worldDave hay   desktop single sign-on in an active directory world
Dave hay desktop single sign-on in an active directory world
Dave Hay
 
Web sphere user group march 2012 - desktop single sign-on in an active dire...
Web sphere user group   march 2012 - desktop single sign-on in an active dire...Web sphere user group   march 2012 - desktop single sign-on in an active dire...
Web sphere user group march 2012 - desktop single sign-on in an active dire...
Dave Hay
 
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
Dave Hay
 
Suppressing http headers from web sphere application server
Suppressing http headers from web sphere application serverSuppressing http headers from web sphere application server
Suppressing http headers from web sphere application server
Dave Hay
 
Installing web sphere application server v7 on red hat enterprise linux v6.3
Installing web sphere application server v7 on red hat enterprise linux v6.3Installing web sphere application server v7 on red hat enterprise linux v6.3
Installing web sphere application server v7 on red hat enterprise linux v6.3
Dave Hay
 
Dave hay web sphere administration for domino administrators
Dave hay   web sphere administration for domino administratorsDave hay   web sphere administration for domino administrators
Dave hay web sphere administration for domino administrators
Dave Hay
 
Dave hay desktop single sign-on in an active directory world
Dave hay   desktop single sign-on in an active directory worldDave hay   desktop single sign-on in an active directory world
Dave hay desktop single sign-on in an active directory world
Dave Hay
 
Dave hay desktop single sign-on in an active directory world
Dave hay   desktop single sign-on in an active directory worldDave hay   desktop single sign-on in an active directory world
Dave hay desktop single sign-on in an active directory world
Dave Hay
 
Web sphere user group march 2012 - desktop single sign-on in an active dire...
Web sphere user group   march 2012 - desktop single sign-on in an active dire...Web sphere user group   march 2012 - desktop single sign-on in an active dire...
Web sphere user group march 2012 - desktop single sign-on in an active dire...
Dave Hay
 
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
IBM Connections and Desktop Single Sign-On using Microsoft Active Directory, ...
Dave Hay
 
Ad

Recently uploaded (20)

tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 

“Secure Portal” or WebSphere Portal – Security with Everything

  • 1. “Secure Portal” or WebSphere Portal – Security with Everything Dave Hay Portal Architect IBM Software Services for Lotus [email protected] 18 March 2010
  • 2. Agenda ● Definition of Terms ● Moving away from the “Out Of The Box” experience ● Federated Repositories ● Custom User Registry ● Authentication against a Corporate Directory ● Authorisation and Personalisation via LDAP and Property Extension Database ● Desktop Single Sign-On in a Microsoft environment ● Back-end SSO – in an all-IBM world ● Back-End SSO – Using a Reverse Web Proxy server ● Back-end SSO – Asserting identity in an open world ● Further Reading 2
  • 3. Portal Operational Model (Production) Cluster Manager Web Delivery Content Server Portal Rendering Site Load Visitor Balancer Content / Portal Content / Portal Database Database Delivery Content Web Portal Authoring Server Cluster Cluster User User Directory Directory 3
  • 4. Definition of Terms ● WebSphere Application Server (WAS) ● WebSphere Portal (WP) ● Authentication vs. Authorisation vs. Personalisation ● Property Extension Database ( aka LookAside ) ● Virtual Member Manager (VMM) ● WebSphere Identity Manager (WIM) ● Custom User Registry (CUR) ● Trust Association Interceptor (TAI) ● Lightweight Third Party Authentication (LTPA) ● Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) ● Security Assertion Markup Language (SAML) ● Kerberos ● Shibboleth 4
  • 6. Moving away from the “Out Of The Box” experience ● Portal automatically secured against WAS via WIM File System Repository ● Optional during WAS installation; default during WP installation ● Provides basic identity, profile and user information ● Simple to manage via WAS/WP user interface and Java/API ● Unwieldy – all user/group management is only via WAS/WP, and not easily accessible to back-end systems without coding ● Portal security cannot “reach out” to back-end resources e.g. no SSO 6
  • 7. Federated Repositories ● WAS/WP 6.1 and beyond ● Provides support for multiple user repositories, including WIM ( File System ), LDAP, databases etc. ● Useful for multiple user communities and use cases e.g. intranet and internet and extranet ● Fits well with virtualization e.g. Virtual Portal ● Needs careful planning and consideration e.g. user/group filters, realms, Single Sign-On domains,unique user identities etc. 7
  • 8. Custom User Registry ● An option for authentication where requirements dictate non-LDAP approach ● Requires custom development ● Good solution for certain use cases e.g. back-end application integration, delegation of user access and management to corporate systems ● Examples of implementation include using mainframe-based application via CUR 8
  • 9. Authentication against a Corporate Directory ● Supported LDAPs Lotus Domino Microsoft Active Directory Tivoli Directory Server Novell eDirectory Sun ONE Directory Server ● Supported vs. tested vs. unsupported ● Read-only vs. Read/Write ● Security Wizard ● Alternative Security Tasks ( ConfigEngine ) ● Can be used stand-alone or as part of Federated Repository solution 9
  • 10. Authorisation and Personalization via LDAP and Property Extension Database ● Describe how LDAP groups and attributes can be used to provide authorisation and personalized access to portal resources ● Authorisation and Personalization can be two sides of the same coin; both can be used to change the user experience based upon external attributes ● Authorization – where can I go now I'm in the portal ? ● Personalization – what can I see ? ● Authorisation – typically related to security e.g. permissions, user groups, roles etc. ● Personalization – typically related to attributes, events, user profile choices ● Customization – typically user controlled rather than externally influenced 10
  • 13. Desktop Single Sign-On in a Microsoft environment ● Provides seamless SSO to users once Windows login has completed ● Requires Portal to use same Active Directory domain as user's Windows desktops ● SPNEGO is used to negotiate the authentication protocol between client and server, using Kerberos ● Works with Internet Explorer and Firefox ● Active Directory and Kerberos ( Key Distribution Centre ) needs to be configured ● WebSphere Trust Association Interceptor (TAI) provided in WAS 6.1 and beyond ● WAS needs to be configured ● User browsers need to be configured ● No longer requires front-end IIS server 13
  • 15. Back-end SSO – in an all-IBM world ● Appropriate for requirements where back-end applications support the IBM Lightweight Third Party Authentication (LTPA) mechanism ● Examples include: - WebSphere Application Server WebSphere Portal Lotus Connections Lotus Domino Lotus Quickr Lotus Sametime ● LTPA token generated by server following initial successful authentication; stored as cookie in browser ● Used to provide authentication to trusted servers; those participating in the same SSO environment (DNS domain) and sharing a common LTPA private key ( encrypted ) 15
  • 16. Back-End SSO – Using a Reverse Web Proxy server ● Examples are Tivoli Access Manager for e-Business (TAMeB) and Siteminder ● IBM experiences tend towards TAMeB but Siteminder info is available ● WebSEAL is the TAMeB web reverse proxy solution ● WebSEAL intercepts all requests for secured, back-end web applications ● Hides application URLs etc. from end-users increasing security ● Authentication and authorisation ( to access web app. or not ) is made in WebSEAL ● If auth/auth sucessful, WebSEAL passes request to WAS/Portal ● TAI deployed in WAS to support this delegated authentication ● Junctions ( transparent or otherwise ) created in WebSEAL for Portal ● LTPA cookie is generated by WebSEAL junction and stored in user's browser, giving onwards SSO 16
  • 18. TAMeB implementation 1 An unauthenticated client issues a request. 2 WebSEAL issues an HTTP authentication challenge. 3 Client responds to challenge. 4 WebSEAL authenticated user against user registry. 5 WebSEAL modifies the Header to include (iv_creds, …) 6 Request to WAS where TAI performs authentication of tai_user 7 User credentials are extracted from header to construct a user principal. 8 WAS sends the request the Portal 9 Portal sends the Output to WebSEAL 10 WebSEAL dispatches the output to the client. 18
  • 19. Back-end SSO – Asserting identity in an open world ● Requirement where SSO is required from WebSphere to an external service ● Can potentially be used in reverse using custom TAI – not supported by IBM ● Necessary to “prove” that WebSphere user has been authenticated ● Open-standard mechanism for the assertion of the user's identity, with implicit trust and security ( SAML ) ● SAML works by way of a paired set of servers – Identity Provider (IdP) and Service Provider (SP) ● Various implements of SSO via SAML including Shibboleth and Tivoli Federated Identity Manager (TFIM) ● Some entitlement to TFIM with WAS Network Deployment http://www-01.ibm.com/software/tivoli/products/federated-identity-mgr-websphere/index.html 19
  • 20. Shibboleth implementation 1) The User attempts to access a Shibboleth-protected resource on the Service Provider site. 2) The User is redirected to the federation WAYF. 3) The User select his or her home institution (*Identity Provider) from the list presented by the WAYF. 4) The Identity Provider, by whatever means it deems appropriate, ensures that the User is authenticated. 5) After successful authentication, a one-time Handle (session identifier) is generated for this User session and is sent to the Service Provider. 6) The Service Provider uses the Handle to request attribute information from the Identity Provider for this User. 7) The Identity Provider, on the basis of its Attribute Release Policy, allows or denies attribute information to be made available to this Service Provider. 8) Based on the attribute information made available to it, the Service Provider allows or refuses the User access to the resource. 20
  • 21. Further Reading IBM WebSphere Application Server V6.1 Security Handbook http://www.redbooks.ibm.com/abstracts/sg246316.html?Open IBM WebSphere Application Server V7.0 Security Guide http://www.redbooks.ibm.com/abstracts/sg247660.html WebSphere Portal Family Wiki http://www-10.lotus.com/ldd/portalwiki.nsf Tivoli Access Manager for e-Business http://www-01.ibm.com/software/tivoli/products/access-mgr-e-bus/ Tivoli Federated Identity Manager http://www.ibm.com/software/tivoli/products/federated-identity-mgr 21