Configure SPNEGO and, optionally Kerberos, on IBM® WebSphere® Application
Server.
Before you begin
The connectionsAdmin J2C alias that you specified during
installation must correspond to a valid account that can authenticate
with Active Directory. The alias must map to an administrative user
account that can authenticate for single sign-on with Active Directory.
If you update the user ID or credentials for this alias, complete
the steps in the Changing references to administrative credentials topic.
Your WebSphere Application Server
administrative account must be a valid account that can authenticate
with Active Directory. User accounts that are specified only in the WebSphere Internal File Repository
cannot check out configuration documents. Nor can such accounts connect
to any of the LC MBeans to run commands.
Tip: The Kerberos authentication protocol (optional) uses
strong cryptography that enables a client to prove its identity to
a server across an insecure network connection. After the client and
server have proven their identity, the authentication protocol encrypts
all data that the client and server exchange. The SPNEGO tokens, which
wrap valid Kerberos tickets, can be used to negotiate the security
for SSO. For information about best practices for Service Principal
Names and SPNEGO configuration, go to Tips on using Kerberos service principal names.
The topic also provides tips for multitier environments. For more
information about setting up SPNEGO web authentication for WebSphere Application Server,
refer to WebSphere with
a side of SPNEGO.
Note: Enabling Kerberos using the Kerberos
and LTPA option is required only if you are using Connections
Mail with a Microsoft™ Exchange
backend.
About this task
To configure SPNEGO and Kerberos on WebSphere Application Server, complete
the following steps:
Procedure
- Log on to the WebSphere Application
Server Integrated Solutions Console on the Deployment Manager and
select .
- Optional: Perform the following steps only
if you want to enable Kerberos.
- Click Kerberos configuration in the Authentication area,
and then specify the following details:
- Kerberos service name
- HTTP
- Kerberos configuration file
- Full path to your Kerberos configuration file
- Kerberos keytab file name
- Full path to your keytab file
- Kerberos realm name
- Name of your Kerberos realm
- Trim Kerberos realm from principal name
- Select this option if it is not selected.
- Enable delegation of Kerberos credentials
- Select this option if it is not selected.
Note: Enable this option
only if you are using Connections Mail with an Exchange backend; otherwise
this setting should not be selected.
- Click OK and then click Save.
- Click Kerberos configuration and then in
the Related Configuration area, click SPNEGO
Web authentication.
Note: SPNEGO Web authentication and
Kerberos authentication use the same Kerberos client configuration
and keytab files.
- Click SPNEGO Web authentication and
then specify the SPNEGO filter as follows:
- In the SPNEGO Filters area, click New and
enter the following details:
- Host name
- Enter the URI for how the IBM Connections
environment is accessed. Typically, it is the hostname/alias of the
HTTP server.
- Kerberos realm name
- Enter your Kerberos realm name. Only required if Kerberos is enabled.
- Filter criteria
- request-url!=noSPNEGO;request-url!=/mobile;request-url!=/nav;request-url!=/bundles/js;request-url!=/static;request-url!=/activities/oauth;request-url!=/blogs/oauth;request-url!=/dogear/oauth;request-url!=/communities/calendar/oauth;request-url!=/communities/service/atom/oauth;request-url!=/communities/service/opensocial/oauth/;request-url!=/communities/recomm/oauth;request-url!=/connections/opensocial/oauth;request-url!=/connections/opensocial/anonymous/rest;request-url!=/connections/opensocial/common;request-url!=/connections/opensocial/gadgets;request-url!=/connections/opensocial/ic;request-url!=/connections/opensocial/rpc;request-url!=/connections/opensocial/social;request-url!=/connections/opensocial/xrds;request-url!=/connections/opensocial/xpc;request-url!=/connections/resources/web;request-url!=/connections/resources/ic;request-url!=/files/oauth;request-url!=/forums/oauth;request-url!=/homepage/oauth;request-url!=/metrics/service/oauth;request-url!=/moderation/oauth;request-url!=/news/oauth;request-url!=/news/follow/oauth;request-url!=/profiles/oauth;request-url!=/wikis/oauth;request-url!=/search/oauth;request-url!=/connections/core/oauth/;request-url!=/connections/oauth/authorize;request-url!=/resources;request-url!=/oauth2/endpoint/;request-url!=/activities_content;request-url!=/files_content;request-url!=/library_content_cache;request-url!=/mobile_content;request-url!=/wikis_content
Note: Ensure
that you separate each filter with a semicolon (;). No other character is allowed as a separator.
- Filter class
- Leave this field blank to allow the system to use the default
filter class (com.ibm.ws.security.spnego.HTTPHeaderFilter).
- SPNEGO not supported error page URL
- Enter the URL to the redirect page that you created. For example: http://webserver/NoSpnegoRedirect.html.
where webserver is
the name of your IBM HTTP Server
instance and NoSpnegoRedirect.html is the name
of the redirect page.
- NTLM token received error page URL
- Enter the URL to the redirect page that you created. For example: http://webserver/NoSpnegoRedirect.html.
- Optional: Select Trim Kerberos
realm from principal name.
- Optional: Select Enable delegation
of Kerberos credentials.
- Click OK and
then click Save.
- On the SPNEGO Web authentication page, complete the following
steps:
- Select Dynamically update SPNEGO.
- Select Enable SPNEGO.
- Select Allow fall back to application authentication
mechanism.
- Optional: Enter the path to the Kerberos
configuration file in the Kerberos configuration file with
full path field. You created this file in the Creating
a service principal name and keytab file topic.
- Optional: Enter the path to the Kerberos
keytab file in the Kerberos keytab file name with full
path field. You created this file in the Creating
a service principal name and keytab file topic.
- Click Apply.
- Specify the level of authentication that users must go
through to access your IBM Connections
deployment. In the following choices, you can force users to always
authenticate or allow users to access Blogs, Bookmarks, Communities,
Files, Profiles, and Wikis anonymously. These anonymous users must
log in only if they try to access a private area. For more information
about forcing authentication, see the Forcing users to log in
before they can access an application topic.
- (default) Allow anonymous access to IBM Connections:
- Select .
- Click the link
to the first IBM Connections
application in the Enterprise Applications table.
- In the Detail
Properties area, click Security role to user/group mapping.
- Select the reader Role, click Map
Special Subjects, and select Everyone.
- Click OK and
then click Save.
- Repeat steps
b through e for the remaining IBM Connections
applications in the Enterprise Applications table.
- Force users to log in to access IBM Connections:
- Select .
- Click the link
to the first IBM Connections
application in the Enterprise Applications table.
- In the Detail
Properties area, click Security role to user/group mapping.
- Select the reader Role, then click Map
Special Subjects and select All Authenticated
in Application's Realm.
- Click OK and
then click Save.
- Repeat steps
b through e for the remaining IBM Connections
applications in the Enterprise Applications table.
- Disable TAI authentication unless you are configuring Tivoli® Access Manager or Siteminder
with SPNEGO, in which case TAI authentication should be enabled
- To disable TAI authentication if you are not configuring Tivoli Access Manager or Siteminder
with SPNEGO, select , and then enter the following
name and value pair:
- Name
- com.ibm.websphere.security.performTAIForUnprotectedURI
- Value
- false
- To enable TAI authentication if configuring Tivoli Access Manager or Siteminder with SPNEGO,
select , and then enter the following name and value pair:
- Name
- com.ibm.websphere.security.performTAIForUnprotectedURI
- Value
- true
- Click OK and then click Save to
preserve your update.
- Click Global Security. In the Authentication area,
click LTPA if you have not configured Kerberos,
and then click Save.
Note: The Kerberos
and LTPA option is required only if you are using Connections
Mail with an Exchange backend.
-
If you're using Cognos, you must disable the MBean to enable the metrics. In the WebSphere Application Server Integrated Solutions Console,
click . Then click New to add the following custom property.
com.ibm.websphere.security.disableGetTokenFromMBean=false
- Synchronize all the nodes in your deployment.
- Stop and restart WebSphere Application
Server:
- Stop all instances of WebSphere Application Server that host
your IBM Connections applications.
- Stop all node agents.
- Restart the Deployment Manager.
- Restart all the node agents.
- Restart all instances of WebSphere Application Server.