Enabling single sign-on for Security Verify Access
Configure HCL Connections™ to use single sign-on with Security Verify Access (formerly Security Access Manager).
Before you begin
Install the supported version of IBM Security Verify Access (ISVA).
Ensure that you can access the installed Connections applications from a web browser.
Set the IBM® WebSphere® Application Server single sign-on domain to the same value as that of the Secure Access Manager server.
Note
- Connections supports the WebSphere cookie-based lightweight third-party authentication (LTPA) mechanism as an SSO solution for ISVA. Connections does not support other SSO solutions that WebSEAL supports such as WebSphere Trust Association Interceptor (TAI), Forms SSO, Cross-domain SSO, or E-community SSO.
- For more information, refer to IBM Security Verify Access on the IBM Documentation site.
About this task
Single sign-on (SSO) enables users to log in to one application of Connections and switch to other applications and resources without having to authenticate again.
Connections supports the use of encrypted connections Transparent Path junctions with ISVA. Connections does not support TCP type junctions or Standard junctions. This procedure uses a WebSphere Application Server LTPA key and WebSEAL Transparent Junctions.
To set up SSO using Security Verify Access, complete the following steps:
Procedure
-
Use available authentication data when an unprotected URI is accessed: On the Global security page, expand Web and SIP security, and then click General settings. Click Authenticate only when the URI is protected and select Use available authentication data when an unprotected URI is accessed, if it is not already selected. Click Apply and then click OK.
-
Import your HTTP Server certificate into the Security Verify Access keystore. To import the certificate, complete the following steps:
-
In Security Verify Access, click Manage > Secure Settings > SSL Certificates and select the pdsrv database.
-
With the pdsrv database selected, click on Manage and select Edit SSL Certificate Database.
-
In the Signer Certificate, select Manage and then select one of the following two options:
- If you select Import, you will be prompted to browse for the certificate file from your local drive.
- If you select Load, you can specify the HTTP hostname, port, and certificate label and import them remotely.
-
After you add the certificate to the database, it displays in the certificate list.
-
Click the link Click here to review the changes or apply them to the system; restart Security Verify Access components when prompted.
Note
If you have already imported other HTTP Server certificates into the WebSEAL certificate file, you must delete them before you can add a certificate.
-
-
To support SSO with the Lightweight Third-Party Authentication (LTPA) key, the same keys and passwords must be shared by Security Verify Access and WebSphere Application Server. To export the keys from WebSphere Application Server, complete the following steps:
-
Log in to the WebSphere Application Server Integrated Solutions Console as an administrator, expand Security, and then click Global security. In the Authentication mechanisms and expiration area, click LTPA.
-
In the Cross-cell single sign-on section, provide values for the following fields:
- Password: Enter a secure password and then confirm the password. You need to provide this password later.
- Fully qualified key file name: Specify a valid path and a file name for the file that holds the exported keys.
For example:
p\*ssw\*rdC:\\WAS\_ltpa.keys -
Click Export keys.
Note
If you have modified your federated repository properties, such as the realm name of the federated repository, re-export your LTPA keys and copy them to the Security Verify Access server, to the same location that you used to create the Security Verify Access junctions. See Step 4 for more details.
-
-
Use the exported LTPA key to configure the transparent path junctions in Security Verify Access.
-
Copy the file containing the LTPA keys that you exported in Step 3 to the Security Verify Access server.
-
In Security Verify Access, click Secure Web Settings > Global Keys > LTPA Keys.
-
In the LTPA Key Files area, click Manage > Import
-
Click Browse and select the exported LTPA key.
-
Click Import.
-
Click the link Click here to review the changes or apply them to the system; restart Security Verify Access components when prompted.
-
Open the pdadmin command line utility, which is installed as part of the Security Verify Access runtime package.
-
Configure a transparent path junction for each installed application. Enter the following command once for each junction:
Note
Do not include the carriage returns in the command. They are added here for display purposes.
server task WebSEAL-instance-name create -t ssl-h backend-server-name -x -p backend-server-port -i -b ignore -f -A -2-F ltpa-token -Z ltpa-password -k transparent-path-jctWhere:
-
WebSEAL-instance-nameis the name of the WebSEAL server. Use the following syntax:WebSEAL\_instance-webseald-tam\_serverFor example:
default-webseald-server.name.example.com -
backend-server-nameis the host name of the Connections server for which Security Verify Access is managing authentication. For example, HTTP Server configured for Connections. backend-server-portis the port used by the backend server.ltpa-tokenis the name of the file that you created to store the keys that you exported from WebSphere Application Server.ltpa-passwordis the password that you defined to encrypt the key file.transparent-path-jctis the transparent path junction for the application. This value must match the URL pattern and must be created once for each URL pattern:- /acce
- /activities
- /appregistry
- /appreg
- /blogs
- /communities
- /community-suggestions
- /connections
- /dm
- /dogear
- /files
- /forums
- /help
- /homepage
- /itm
- /metrics
- /metricssc
- /mobile
- /mobileAdmin
- /moderation
- /news
- /oauth2
- /profiles
- /push
- /search
- /selfservice
- /social
- /socialsidebar
- /touchpoint
- /wikis
- /wsi
- /xcc
For example:
server task default-webseald-server.name.example.com create -t ssl -h another.server.name.example.com -x -p 443 -i -b ignore -f -A -2 -F -k C:\\WAS7\_ltpa.keys -Z password /profilesNote
- If an invalid certificate error occurs, import your backend-server-name certificate into the WebSEAL certificate store before you create the junctions. Verify that you completed Step 2 correctly and the SSL certificate is being imported to the correct key file.
- The transparent path junctions include /help even though it is not an independent Connections application. It is a part of the News application but must be configured as a separate junction.
-
For more information about using the pdadmin command line utility, refer to Server task commands for junctions in the Security Verify Access knowledge center.
-
-
Create a default Connections ACL to override the default WebSEAL ACL by running the following commands:
acl create lc3-default-acl acl modify lc3-default-acl set user sec\_master TcmdbsvaBRlrx acl modify lc3-default-acl set any-other Tmdrx acl modify lc3-default-acl set unauthenticated T acl modify lc3-default-acl set group iv-admin TcmdbsvaBRrxl acl modify lc3-default-acl set group webseal-servers Tgmdbsrxl -
Attach default ACLs to resources that are protected by form-authentication.
-
Attach the default ACL to application root URLs:
acl attach /WebSEAL/isam\_server-WebSEAL\_instance/app\_root lc3-default-aclwhere:
isam\_serveris the host name of the Security Verify Access serverWebSEAL\_instanceis the name of the instance of the WebSEAL server that is configured to manage Connections; for example: defaultapp\_rootis the root path to the Connections applications, including the following:- /activities
- /blogs
- /communities
- /dogear
- /files
- /forums
- /homepage
- /news
- /metrics
- /metricssc
- /mobile
- /mobileAdmin
- /moderation
- /profiles
- /push
- /search
- /selfservice
- /socialsidebar
- /touchpoint
- /wikis
- /xcc
lc3-default-aclis the access control list (ACL) that you defined in Step 5 For example: acl attach /WebSEAL/tam.example.com-default/activities example-default-acl
-
Attach the default ACL to other resources that are protected by form-authentication. Run the following commands:
acl attach /WebSEAL/isam\_server-WebSEAL\_instance/object-path lc3-default-aclwhere:
isam\_serveris the host name of the Security Verify Access serverWebSEAL\_instanceis the name of the instance of the WebSEAL server that is configured to manage Connections; for example: defaultobject-pathis the path to the resource on that domainlc3-default-aclis the access control list that you defined in Step 5. Replace this variable with the name of your default ACL. For example: acl attach /WebSEAL/tam.example.com-default/activities/service/getnonce/forms example-default-acl
See the Resources that require form-authentication table for a list of URLs that are protected by form-authentication.
Application Protected URL Activities /activities/seedlist/myserver /activities/service/atom2/communityEvent /activities/service/atom2/forms /activities/service/download/forms /activities/service/getnonce/forms Blogs /blogs/seedlist/myserver Bookmarks /dogear/seedlist/myserver /dogear/api_fba/app Common resources /connections/config /connections/settings/globalization/service /connections/opensocial/rest Communities /communities/calendar/seedlist/myserver /communities/forum/service/atom/forms /communities/recomm/ajax /communities/recomm/atom_form Engagement Center /xcc Forums /forums/atom/forms /forums/seedlist/myserver Invite /selfservice Profiles /profiles/atom/forms /profiles/atom2/forms URL Preview /connections/opengraph/form/api/oembed /connections/thumbnail/form/api/imageProxy Sidebar /socialsidebar Touchpoint /touchpoint
-
-
Define the unprotected access control list and then attach unprotected resources and resources where Connections requires basic authentication using the pdadmin command line utility, so that Security Verify Access passes HTTP requests for these resources through to WebSphere Application Server for authentication.
-
To define the unprotected access control list, enter the following commands:
acl create ic-bypass-acl acl modify ic-bypass-acl set user sec\_master TcmdbsvaBRlrx acl modify ic-bypass-acl set any-other Tmdrx acl modify ic-bypass-acl set unauthenticated Tmdrx acl modify ic-bypass-acl set group iv-admin TcmdbsvaBRrxl acl modify ic-bypass-acl set group webseal-servers Tgmdbsrxlwhere
ic-bypass-aclis the name of the unprotected access control list; for example, connections-acl-bypass.Note
The
any-otherparameter refers to authenticated users who are not defined by other parameters such assec_masteroriv-admin. -
To attach the access control list to resources that do not require authentication, run the following command:
where:acl attach /WebSEAL/isam\_server-WebSEAL\_instance/object-path ic-bypass-aclisam\_serveris the host name of the Security Verify Access serverWebSEAL\_instanceis the name of the instance of the WebSEAL server that is configured to manage Connections; for example: defaultobject-pathis the path to the resource on that domainic-bypass-aclis the access control list that you defined in Step 7 a See the Resources that do not require authentication table for a list of unprotected URLs .
Application Unprotected URL Activities /activities/auth /activities/authverify /activities_content /activities/images /activities/service/html/mainpage /activities/oauth /activities/service/html/images /activities/service/html/servermetrics /activities/service/html/serverstats /activities/static /activities/service/html/styles /activities/service/html/themes /activities/serviceconfigs Blogs /blogs/static /blogs/oauth /blogs/serviceconfigs Bookmarks /dogear/bookmarklet/tagslike/proxy /dogear/oauth /dogear/peoplelike /dogear/serviceconfigs /dogear/static /dogear/tagslike /dogear/tagrecs Common resources /connections/bookmarklet/tools/blet.js /connections/bookmarklet/tools/discussThis.js /connections/bookmarklet/tools/rlet.js /connections/core/oauth /connections/oauth /connections/opensocial/oauth /connections/resources/socmail-client /connections/resources/ic /connections/resources/web /connections/resources/socpim /connections/rte /connections/serviceconfigs /nav/common Communities /communities/calendar/calendar.xml /communities/calendar/oauth /communities/images /communities/recomm/oauth /communities/recomm/recomm.xml /communities/service/atom/oauth /communities/service/html/communityview /communities/service/json/oauth/ /communities/service/opensocial/oauth /communities/serviceconfigs /communities/service/html/community/autoCompleteMembers.do /communities/service/html/singleas /communities/static /communities/stylesheet /communities/tools/embedAS.html Content Manager /wsi /acce /dm Engagement Center /xcc/templates /xcc/js Files /files/app /files/basic/anonymous/api /files/basic/anonymous/cmis /files/basic/anonymous/opensocial /files_content /downloadfiles /files/form/anonymous/api /files/form/anonymous/cmis /files/form/anonymous/opensocial /files/oauth /files/static /files/serviceconfigs Forums /forums/oauth /forums/serviceconfigs /forums/static Home page /homepage/oauth /homepage/search /homepage/serviceconfigs /homepage/static Libraries /library_content_cache Moderation /moderation/oauth Mobile /mobile/homepage/SecurityConfiguration /mobile_content News /help /news/common/sand/static/ /news/follow/oauth /news/microblogging/isPermitted.action /news/oauth /news/serviceconfigs /news/sharebox/config.action /news/static OAuth Provider /oauth2 Profiles /profiles/images /profiles/oauth /profiles/serviceconfigs /profiles/static /profiles/widget-catalog Push /push/basic/comet /push/form/comet Search /search/atom/search/* /search/oauth /search/static /search/serviceconfigs URL Preview /connections/opengraph/form/anonymous/api/oembed /connections/opengraph/basic/anonymous/api/oembed /connections/opengraph/oauth/anonymous/api/oembed /connections/thumbnail/api/imageProxy Widget container /connections/opensocial/anonymous/rest /connections/opensocial/common /connections/opensocial/gadgets /connections/opensocial/ic /connections/opensocial/rpc /connections/opensocial/social /connections/opensocial/xrds /connections/opensocial/xpc Wikis /wikis/basic/anonymous/api /wikis_content /wikis/form/anonymous/api /wikis/oauth /wikis/serviceconfigs /wikis/static -
The Atom feeds on Connections servers use basic authentication because most feed readers are unable to authenticate with form-authentication. WebSphere Application Server and Connections applications authenticate these Atom HTTP requests through basic authentication as required. To attach the unprotected ACL to resources that Connections protects with basic authentication, run the following command:
acl attach /WebSEAL/isam\_server-WebSEAL\_instance/object-pathic-bypass-aclwhere:
isam\_serveris the host name of the Security Verify Access serverWebSEAL\_instanceis the name of the instance of the WebSEAL server that is configured to manage Connections; for example: defaultobject-pathis the path to the resource on that domainic-bypass-aclis the access control list that you defined in Step 7 a
For example: acl attach /WebSEAL/example.com-default/activities/service/atom example-bypass-acl
See the Resources that require basic authentication table for a list of protected URLs .
Application Protected URL Activities /activities/follow/atom
/activities/service/atom
/activities/service/atom2
/activities/service/download
/activities/service/getnonce
/activities/service/html/autocompleteactivityname
/activities/service/html/autocompleteentryname
/activities/service/html/autocompletemembersApp Registry /appregistry Blogs /blogs/api
/blogs/atom
/blogs/follow/atom
/blogs/issuecategories
/blogs/roller-ui/blog
/blogs/roller-ui/feed
/blogs/roller-ui/BlogsWidgetEventHandler.do
/blogs/roller-ui/rendering/api
/blogs/roller-ui/rendering/feed
/blogs/services/atomBookmarks /dogear/api/app
/dogear/api/deleted
/dogear/api/notify
/dogear/atom
/dogear/people.doCommon resources /connections/opensocial/basic/rest Communities /communities/calendar/atom
/communities/calendar/handleevent
/communities/calendar/ical
/communities/community-suggestions
/communities/follow/atom
/communities/forum/service/atom
/communities/recomm/atom
/communities/recomm/handleevent
/communities/service/atom
/communities/service/atom/communities/my
/communities/service/json
/communities/service/opensocialFiles /files/basic/api
/files/basic/api/myuserlibrary/feed
/files/basic/cmis
/files/basic/opensocial
/files/follow/atomForums /forums/atom
/forums/follow/atomHome page /homepage/atom/mysearch
/homepage/atom/search
/homepage/web/updates/News /news/atom/service
/news/atom/stories/community
/news/atom/stories/newsfeed
/news/atom/stories/public
/news/atom/stories/save
/news/atom/stories/saved
/news/atom/stories/statusupdates
/news/atom/stories/top
/news/atom/watchlist
/news/atomfba/stories/publicOrient Me /community-suggestions Profiles /profiles/atom
/profiles/atom2
/profiles/atom/forms/tagCloud.do
/profiles/follow/atom
/profiles/admin/atom
/profiles/photo.do
/profiles/json
/profiles/audio.do
/profiles/vcardURL Preview /connections/opengraph/basic/api/oembed
/connections/thumbnail/basic/api/imageProxyWikis /wikis/basic/api
/wikis/follow/atomNote
If you use case-insensitive junctions in your Security Verify Access configuration, specify
tagcloud.do(lowercase 'c') instead oftagCloud.do. -
Include the following unprotected resources when you configure ISVA.
- /communities/seedlist/myserver
- /dogear/seedlist/myserver
- /profiles/seedlist/myserver
- /news/seedlist/myserver
- /activities/seedlist/myserver
- /communities/calendar/seedlist/myserver
- /blogs/seedlist/myserver
- /forums/seedlist/myserver
- /wikis/seedlist/myserver
-
-
To get the activity stream on the Homepage to display, you must import an encrypted connection (SSL) certificate from the ISVA server to the nodes.
- Navigate to SSL certificate and key management > Key stores and certificates > CellDefaultTrustStore> \ signer certs.
- Restart the Homepage application.
Note
To get the ECM events to appear, the ISAM certs must be imported to the NodeDefaultTrustStore.
If the ISVA server and the WebSEAL server are different, you need to import the cert from the WebSEAL server.
-
Specify a dynamic URL pattern to support the Blogs application and mail notification:
-
Create a dynamic URL configuration file named dynurl.conf. The dynurl.conf file is a plain text file that contains mappings from objects to patterns. Using a text editor, add the following content to the file:
/blogs/blogsfeed /blogs/*/feed/*
/blogs/blogsapi /blogs/*/api/*
Save the file and deploy the changes.
-
To attach the bypass ACL that you defined in Step 7 a to the dynurl ACL, open the pdadmin command line utility and enter the following commands:
acl attach /WebSEAL/isam_server-WebSEAL_instance/blogs/blogsfeed ic-bypass-acl
acl attach /WebSEAL/isam_server-WebSEAL_instance/blogs/blogsapi ic-bypass-acl>
where:
- isam_server is the host name of the Security Verify Access server.
- WebSEAL_instance is the name of the instance of the WebSEAL server that is configured to manage Connections; for example: default.
- ic-bypass-acl is the name of the access control list that you defined earlier. For example:
acl attach /WebSEAL/server.name.example.com -default/blogs/blogsfeed open
-
To allow large Blogs posts, open the webseald.conf file and add the following parameter:
dynurl-allow-large-posts = yes
-
To enable the uploading of PDF files, add the following parameter to the webseald.conf file:
suppress-dynurl-parsing-of-posts = yes
-
-
Configure Security Verify Access to use form-authentication over HTTPS by updating the webseald-server-name.conf file. Add the following line to the [forms] stanza:
forms-auth = https
Note
You cannot specify HTTP-only authentication. To specify both HTTP and HTTPS, add the following line: forms-auth = both.
-
(Do not complete this step for Security Verify Access with SPNEGO) Add HCL Allow access to the Embedded Experience gadget by adding the following line to the [ba] stanza in the webseald-server-name.conf file:
ba-auth = none
-
Configure content filtering by adding the following lines to the
webseald-server-name.conffile:\[filter-content-types\] type = text/xml type = application/atom+xml \[script-filtering\] script-filter = yes rewrite-absolute-with-absolute = yes -
Configure recognition of double-byte character sets. Update the webseald-server-name.conf file:
Add the following lines:
decode-query = yesutf8-qstring-support-enabled = yes -
Configure Security Verify Access as the reverse proxy for Connections. Update the webseald-server-name.conf file:
Add the following line to the [server] stanza:
web-host-name = fully-qualified-host-nameAdd the following line to the [session] stanza:
use-same-session = yes15. Configure Security Verify Access to include host information in the HTTP header. Update the webseald-server-name.conf file:In the
[header-names]stanza, add the following line:httphdr{host} = X-Forwarded-Host
Stop and restart your WebSEAL instance.
-
Determine how you want the system to behave when users log out of Connections. By default, when users click Log out in the SSO environment, they are not fully logged out of Connections. Edit the HTTP Server httpd.conf configuration file to implement the post-log out behavior. By default, the file is located in the following directory:
- Linux™:
/opt/IBM/HTTPServer/conf - Windows™:
C:\\IBM\\HTTPServer\\confTo capture requests to /ibm_security_logout and redirect them to /pkmslogout, add the following rewrite rules to the httpd.conf file:
RewriteEngine On
RewriteCond %{REQUEST_URI} /(.*)/ibm_security_logout(.*)
RewriteRule ^/(.*) /pkmslogout [noescape,L,R]
Note
You must add these rules to both the HTTP and HTTPS entries.
Ensure that the line that enables mod_rewrite is not commented out by removing the preceding # symbol. For example:
LoadModule rewrite_module modules/mod_rewrite.so
The following example illustrates a typical portion of the httpd.conf file after you have implemented the steps that are described in this step:
RewriteEngine On RewriteCond %\{REQUEST\_URI\} /\(.\*\)/ibm\_security\_logout\(.\*\) RewriteRule ^/\(.\*\) /pkmslogout \[noescape,L,R\] LoadModule ibm\_ssl\_module modules/mod\_ibm\_ssl.so <IfModule mod\_ibm\_ssl.c\> Listen 0.0.0.0:443 <VirtualHost \*:443\> ServerName connections.example.com SSLEnable RewriteEngine On RewriteCond %\{REQUEST\_URI\} /\(.\*\)/ibm\_security\_logout\(.\*\) RewriteRule ^/\(.\*\) /pkmslogout \[noescape,L,R\] </VirtualHost\> </IfModule\> SSLDisable - Linux™:
-
Add an ErrorDocument 500 statement to the
httpd.conffile. This statement appears in the user's browser if a Connections application becomes unavailable. -
Save and close the
httpd.conffile. -
Restart HTTP Server.
-
The value of the cookie timeout attribute in the LotusConnections-config.xml file must be smaller than the values of the timeout and inactive-timeout attributes in the
webseald-server-name.conffile. Check these values in the[session]stanza of thewebseald-server-name.conffile and edit them if necessary.Note
The values of the timeout parameters in the Security Verify Access configuration file are given in seconds but the CookieTimeout value in the LotusConnections-config.xml file is given in minutes.
Use the following example as a guide:
# Maximum lifetime (in seconds) for an entry in the credential cache
# Setting this to zero allows entries in the cache to fill without expiry until the
# cache contains the number of entries specified by max-entries. After that
# point, entries are expired according to a least recently used algorithm.
timeout = 3600
# Lifetime (in seconds) of inactive entries in the credential cache.
# To disable, set to 0.
inactive-timeout = 600
-
Restart your cluster: Stop all application servers and all nodes, and then restart the deployment manager, all the nodes, and all the application servers.
Using WebSEAL for server to server communication
To send all traffic through your WebSeal server, including server to server traffic, update the LotusConnections-config.xml file.
Parent topic: Configuring single sign-on
Related information
Enabling single sign-on for standalone LDAP
Changing references to administrative credentials