Enabling single sign-on for Tivoli Access Manager

Configure IBM® Connections to use single sign-on with IBM Secure Access Manager (formerly Tivoli® Access Manager).

Before you begin

Install the supported version of IBM Security Access Manager (ISAM).

Ensure that you can access the installed IBM Connections applications from a web browser.

Set the IBM WebSphere® Application Server single sign-on domain to the same value as that of the IBM Secure Access Manager server.

Note:
  • IBM Connections supports the WebSphere cookie-based lightweight third-party authentication (LTPA) mechanism as an SSO solution for ISAM. IBM Connections does not support other SSO solutions that WebSEAL supports such as WebSphere Trust Association Interceptor (TAI), Forms SSO, Cross-domain SSO, or E-community SSO.
  • For more information, refer to Security Access Manager knowledge center.

About this task

Single sign-on (SSO) enables users to log in to one application of IBM Connections and switch to other applications and resources without having to authenticate again.

IBM Connections supports the use of encrypted connections Transparent Path junctions with ISAM. IBM Connections does not support TCP type junctions or Standard junctions. This procedure uses a WebSphere Application Server LTPA key and WebSEAL Transparent Junctions.

To set up SSO using Security Access Manager, complete the following steps:

Procedure

  1. Use available authentication data when an unprotected URI is accessed: On the Global security page, expand Web and SIP security, and then click General settings. Click Authenticate only when the URI is protected and select Use available authentication data when an unprotected URI is accessed, if it is not already selected. Click Apply and then click OK.
  2. Import your IBM HTTP Server certificate into the Security Access Manager keystore. To import the certificate, complete the following steps:
    1. Copy the WebSEAL certificate key file to the system where IBM HTTP Server is installed.

      You can discover the location of the WebSEAL certificate key file by examining the WebSEAL configuration file (ISAM_install_root/PDWeb/etc/webseald-default.conf). To discover the location of the key file, search the file for the webseal-cert-keyfile keyword.

      For example:copy "C:\Program Files\Tivoli\PDWeb/www-default\certs\pdsrv.kdb on the Security Access Manager server to C:\pdsrv.kdb on the system where IBM HTTP Server is installed.

    2. On the system where IBM HTTP Server is installed, run the following command to start the IBM Key Management utility: ibm_http_server_root/bin/ikeyman.sh|bat

      For example: C:\IBM\HTTPServer\bin\ikeyman.bat

    3. Update http.comp to update your key file to use the file that you created when you installed your IBM HTTP Server. Click Key Database File - Open, with the following values:
      Key database type
      CMS
      File Name
      ihskey.kdb
      File Location
      ibm_http_server_root/ssl/

      For example: C:\IBM\HTTPServer\ssl\

      SSLStashFlie
      C:\IBM\HTTPServer\ssl\ihskey.sth

      Click OK and enter the password for your IBM HTTP Server key file.

    4. Under Key database content, select Personal Certificates.
    5. Click Extract Certificate and specify a file name and location for storing the certificates. Leave the Field Data type unchanged.
      For example:
      • Certificate file name: cert.arm
      • Location: C:\
    6. Using the iKeyman utility, open the WebSEAL certificate key file. When you are prompted for the password, enter the password of your WebSEAL key file. The default password is pdsrv.
    7. Under Key database content, select Signer Certificates.
    8. Click Add and then locate the extracted IBM HTTP Server certificate file. Enter a label for this certificate; for example: LC3_IHS_cerficate.
      Note: If you have already imported other IBM HTTP Server certificates into the WebSEAL certificate file, you must delete them before you can add a new certificate.
    9. Click Key Database File - Close to save your changes to the WebSEAL pdsrv.kdb certificate file and close the file.
    10. Copy the modified pdsrv.kdb WebSEAL certificate file to the same location on the WebSEAL server.

      For example: C:/Program Files/Tivoli/PDWeb/www-default/certs/pdsrv.kdb

  3. To support SSO with the Lightweight Third-Party Authentication (LTPA) key, the same keys and passwords must be shared by Security Access Manager and WebSphere Application Server. To export the keys from WebSphere Application Server, complete the following steps:
    1. Log into the WebSphere Application Server Integrated Solutions Console as an administrator, expand Security, and then click Global security. In the Authentication mechanisms and expiration area, click LTPA.
    2. In the Cross-cell single sign-on section, provide values for the following fields:
      • Password Enter a secure password and then confirm the password. You need to provide this password later
      • Fully qualified key file name Specify a valid path and a file name for the file that will hold the exported keys

      For example:

      p*ssw*rd

      C:\WAS_ltpa.keys

    3. Click Export keys.
    Note: If you have modified your federated repository properties, such as the realm name of the federated repository, re-export your LTPA keys and copy them to the Security Access Manager server, to the same location that you used to create the Security Access Manager junctions. See Step 4 for more details.
  4. If you're using Cognos, you must disable the MBean to enable the metrics. In the WebSphere Application Server Integrated Solutions Console, click Security > Global Security > Custom Properties. Then click New to add the following custom property.
    com.ibm.websphere.security.disableGetTokenFromMBean=false
  5. Use the exported LTPA key to configure the transparent path junctions in Tivoli Access Manager.
    1. Copy the LTPA keys that you exported in Step 1 to the Tivoli Access Manager server.

      For example: C:\WAS7_ltpa.keys

    2. Open the pdadmin command line utility, which is installed as part of the Security Access Manager runtime package.
    3. Configure a transparent path junction for each installed application. Enter the following command once for each junction:
      Note: Do not include the carriage returns in the command. They are added here for display purposes.

      server task WebSEAL-instance-name create -t ssl

      -h backend-server-name -x -p backend-server-port -i -b ignore -f -A -2

      -F ltpa-token -Z ltpa-password -k transparent-path-jct

      where:
      • WebSEAL-instance-name is the name of the WebSEAL server. Use the following syntax:

        WebSEAL_instance-webseald-tam_server

        For example: default-webseald-server.name.example.com

      • backend-server-name is the host name of the IBM Connections server for which Security Access Manager is managing authentication. For example, IBM HTTP Server configured for IBM Connections.
      • backend-server-port is the port used by the backend server.
      • ltpa-token is the name of the file that you created to store the keys that you exported from WebSphere Application Server.
      • ltpa-password is the password that you defined to encrypt the key file.
      • transparent-path-jct is the transparent path junction for the application. This value must match the URL pattern and must be created once for each URL pattern:
        • /acce
        • /activities
        • /blogs
        • /cognos
        • /communities
        • /connections
        • /dm
        • /dogear
        • /files
        • /forums
        • /help
        • /homepage
        • /metrics
        • /mobile
        • /mobileAdmin
        • /moderation
        • /news
        • /oauth2
        • /profiles
        • /push
        • /search
        • /wikis
        • /wsi

      For example:

      server task default-webseald-server.name.example.com create -t ssl -h another.server.name.example.com -x -p 443 -i -b ignore -f -A -2 -F -k C:\WAS7_ltpa.keys -Z password /profiles

      Notes:
      • If an invalid certificate error occurs, import your backend-server-name certificate into the WebSEAL certificate store before you create the junctions. Verify that you completed Step 2 correctly and the SSL certificate is being imported to the correct key file.
      • The transparent path junctions include /help even though it is not an independent IBM Connections application. It is an integral part of the News application but must be configured as a separate junction.

    For more information about using the pdadmin command line utility, refer to Server task commands for junctions in the Security Access Manager knowledge center.

  6. Create a default IBM Connections ACL to override the default WebSEAL ACL by running the following commands:

    acl create lc3-default-acl

    acl modify lc3-default-acl set user sec_master TcmdbsvaBRlrx

    acl modify lc3-default-acl set any-other Tmdrx

    acl modify lc3-default-acl set unauthenticated T

    acl modify lc3-default-acl set group iv-admin TcmdbsvaBRrxl

    acl modify lc3-default-acl set group webseal-servers Tgmdbsrxl

  7. Attach default ACLs to resources that are protected by form-authentication.
    1. Attach the default ACL to application root URLs:

      acl attach /WebSEAL/isam_server-WebSEAL_instance/app_root lc3-default-acl

      where:
      • isam_server is the host name of the Security Access Manager server
      • WebSEAL_instance is the name of the instance of the WebSEAL server that is configured to manage IBM Connections; for example: default
      • app_root is the root path to the IBM Connections applications, including the following:
        • /activities
        • /blogs
        • /cognos
        • /communities
        • /dogear
        • /files
        • /forums
        • /homepage
        • /news
        • /metrics
        • /mobile
        • /mobileAdmin
        • /moderation
        • /profiles
        • /push
        • /search
        • /wikis
      • lc3-default-acl is the access control list (ACL) that you defined in Step 5

      For example: acl attach /WebSEAL/tam.example.com-default/activities example-default-acl

    2. Attach the default ACL to other resources that are protected by form-authentication. Run the following commands:

      acl attach /WebSEAL/isam_server-WebSEAL_instance/object-path lc3-default-acl

      where:
      • isam_server is the host name of the Security Access Manager server
      • WebSEAL_instance is the name of the instance of the WebSEAL server that is configured to manage IBM Connections; for example: default
      • object-path is the path to the resource on that domain
      • lc3-default-acl is the access control list that you defined in Step 5. Replace this variable with the name of your default ACL.

      For example: acl attach /WebSEAL/tam.example.com-default/activities/service/getnonce/forms example-default-acl

      See the Resources that require form-authentication table for a list of URLs that are protected by form-authentication.
      Table 1. Resources that require forms authentication

      This table shows all Connections applications with associated protected URLs.

      Application Protected URL
      Activities /activities/seedlist/myserver
      /activities/service/atom2/communityEvent
      /activities/service/atom2/forms
      /activities/service/download/forms
      /activities/service/getnonce/forms
      Blogs /blogs/seedlist/myserver
      Bookmarks /dogear/seedlist/myserver
      Bookmarks /dogear/api_fba/app
      Common resources /connections/config
      Common resources /connections/settings/globalization/service
      Common resources /connections/opensocial/rest
      Communities /communities/calendar/seedlist/myserver
      /communities/forum/service/atom/forms
      /communities/recomm/ajax
      /communities/recomm/atom_form
      /communities/service/atom/forms
      Forums /forums/atom/forms
      /forums/seedlist/myserver
      Metrics /metrics
      /cognos
      /cognos/servlet/ping
      Profiles /profiles/atom/forms
      /profiles/atom2/forms
      URL Preview /connections/opengraph/form/api/oembed
      /connections/thumbnail/form/api/imageProxy
  8. Define the unprotected access control list and then attach unprotected resources and resources that require basic-authentication to it using the pdadmin command line utility, so that Security Access Manager passes HTTP requests for these resources through to WebSphere Application Server for authentication.
    1. To define the unprotected access control list, enter the following commands:

      acl create ic-bypass-acl

      acl modify ic-bypass-acl set user sec_master TcmdbsvaBRlrx

      acl modify ic-bypass-acl set any-other Tmdrx

      acl modify ic-bypass-acl set unauthenticated Tmdrx

      acl modify ic-bypass-acl set group iv-admin TcmdbsvaBRrxl

      acl modify ic-bypass-acl set group webseal-servers Tgmdbsrxl

      where ic-bypass-acl is the name of the unprotected access control list; for example, connections-acl-bypass.
      Note: The any-other parameter refers to authenticated users who are not defined by other parameters such as sec_master or iv-admin.
    2. To attach the access control list to resources that do not require authentication, run the following command:

      acl attach /WebSEAL/isam_server-WebSEAL_instance/object-path ic-bypass-acl

      where:
      • isam_server is the host name of the Security Access Manager server
      • WebSEAL_instance is the name of the instance of the WebSEAL server that is configured to manage IBM Connections; for example: default
      • object-path is the path to the resource on that domain
      • ic-bypass-acl is the access control list that you defined in Step 7 a
      See the Resources that do not require authentication table for a list of unprotected URLs .
      Table 2. Resources that do not require authentication

      This table shows all Connections applications with associated unprotected URLs.

      Application Unprotected URL
      Activities /activities/auth
      /activities/authverify
      /activities_content
      /activities/images
      /activities/service/html/mainpage
      /activities/oauth
      /activities/service/html/images
      /activities/service/html/servermetrics
      /activities/service/html/serverstats
      /activities/static
      /activities/service/html/styles
      /activities/service/html/themes
      /activities/serviceconfigs
      Blogs /blogs/static
      /blogs/oauth
      /blogs/serviceconfigs
      Bookmarks /dogear/bookmarklet/tagslike/proxy
      /dogear/oauth
      /dogear/peoplelike
      /dogear/serviceconfigs
      /dogear/static
      /dogear/tagslike
      /dogear/tagrecs
      Common resources /connections/bookmarklet/tools/blet.js
      /connections/bookmarklet/tools/discussThis.js
      /connections/bookmarklet/tools/rlet.js
      /connections/core/oauth
      /connections/oauth
      /connections/opensocial/oauth
      /connections/resources/socmail-client
      /connections/resources/ic
      /connections/resources/web
      /connections/resources/socpim
      /connections/rte
      /connections/serviceconfigs
      /nav/common
      Content Manager /wsi
      /acce
      /dm
      Communities /communities/calendar/calendar.xml
      /communities/calendar/oauth
      /communities/images
      /communities/recomm/oauth
      /communities/recomm/recomm.xml
      /communities/service/atom/oauth
      /communities/service/html/communityview
      /communities/service/json/oauth/
      /communities/service/opensocial/oauth
      /communities/serviceconfigs
      /communities/service/html/community/autoCompleteMembers.do
      /communities/service/html/singleas
      /communities/static
      /communities/stylesheet
      /communities/tools/embedAS.html
      Files /files/app
      /files/basic/anonymous/api
      /files/basic/anonymous/cmis
      /files/basic/anonymous/opensocial
      /files_content
      /downloadfiles
      /files/form/anonymous/api
      /files/form/anonymous/cmis
      /files/form/anonymous/opensocial
      /files/oauth
      /files/static
      /files/serviceconfigs
      Forums /forums/oauth
      /forums/serviceconfigs
      /forums/static
      Home page /homepage/oauth
      /homepage/search
      /homepage/serviceconfigs
      /homepage/static
      Libraries /library_content_cache
      Metrics /metrics/service/eventTracker
      /metrics/service/oauth
      /metrics/serviceconfigs
      /cognos/servlet
      Moderation /moderation/oauth
      Mobile /mobile/homepage/SecurityConfiguration
      /mobile_content
      News /help
      /news/common/sand/static/
      /news/follow/oauth
      /news/microblogging/isPermitted.action
      /news/oauth
      /news/serviceconfigs
      /news/sharebox/config.action
      /news/static
      OAuth Provider /oauth2
      Profiles /profiles/images
      /profiles/oauth
      /profiles/serviceconfigs
      /profiles/static
      /profiles/widget-catalog
      Search /search/atom/search/*
      /search/oauth
      /search/static
      /search/serviceconfigs
      URL Preview /connections/opengraph/form/anonymous/api/oembed
      /connections/opengraph/basic/anonymous/api/oembed
      /connections/opengraph/oauth/anonymous/api/oembed
      /connections/thumbnail/api/imageProxy
      Widget container /connections/opensocial/anonymous/rest
      /connections/opensocial/common
      /connections/opensocial/gadgets
      /connections/opensocial/ic
      /connections/opensocial/rpc
      /connections/opensocial/social
      /connections/opensocial/xrds
      /connections/opensocial/xpc
      Wikis /wikis/basic/anonymous/api
      /wikis_content
      /wikis/form/anonymous/api
      /wikis/oauth
      /wikis/serviceconfigs
      /wikis/static
    3. The Atom feeds on IBM Connections servers use basic authentication because most feed readers are unable to authenticate with form-authentication. WebSphere Application Server and IBM Connections applications authenticate these Atom HTTP requests through basic authentication as required. To attach the unprotected ACL to resources that IBM Connections protects with basic authentication, run the following command:

      acl attach /WebSEAL/isam_server-WebSEAL_instance/object-path ic-bypass-acl

      where:
      • isam_server is the host name of the Security Access Manager server
      • WebSEAL_instance is the name of the instance of the WebSEAL server that is configured to manage IBM Connections; for example: default
      • object-path is the path to the resource on that domain
      • ic-bypass-acl is the access control list that you defined in Step 7 a

      For example: acl attach /WebSEAL/example.com-default/activities/service/atom example-bypass-acl

      See the Resources that require basic authentication table for a list of protected URLs .
      Table 3. Resources that require basic authentication

      This table shows all Connections applications with associated protected URLs

      Application Protected URL
      Activities /activities/follow/atom
      /activities/service/atom
      /activities/service/atom2
      /activities/service/download
      /activities/service/getnonce
      /activities/service/html/autocompleteactivityname
      /activities/service/html/autocompleteentryname
      /activities/service/html/autocompletemembers
      Blogs /blogs/api
      /blogs/atom
      /blogs/follow/atom
      /blogs/issuecategories
      /blogs/roller-ui/blog
      /blogs/roller-ui/feed
      /blogs/roller-ui/BlogsWidgetEventHandler.do
      /blogs/roller-ui/rendering/api
      /blogs/roller-ui/rendering/feed
      /blogs/services/atom
      Bookmarks /dogear/api/app
      /dogear/api/deleted
      /dogear/api/notify
      /dogear/atom
      /dogear/people.do
      Common resources /connections/opensocial/basic/rest
      Communities /communities/calendar/atom
      /communities/calendar/handleevent
      /communities/calendar/ical
      /communities/follow/atom
      /communities/forum/service/atom
      /communities/recomm/atom
      /communities/recomm/handleevent
      /communities/service/atom
      /communities/service/atom/communities/my
      /communities/service/json
      /communities/service/opensocial
      Files /files/basic/api
      /files/basic/api/myuserlibrary/feed
      /files/basic/cmis
      /files/basic/opensocial
      /files/follow/atom
      Forums /forums/atom
      /forums/follow/atom
      Home page /homepage/atom/mysearch
      /homepage/atom/search
      /homepage/web/updates/
      News /news/atom/service
      /news/atom/stories/community
      /news/atom/stories/newsfeed
      /news/atom/stories/public
      /news/atom/stories/save
      /news/atom/stories/saved
      /news/atom/stories/statusupdates
      /news/atom/stories/top
      /news/atom/watchlist
      /news/atomfba/stories/public
      Profiles /profiles/atom
      /profiles/atom2
      /profiles/atom/forms/tagCloud.do
      Note: If you use case-insensitive junctions in your Tivoli Access Manager configuration, specify tagcloud.do instead of tagCloud.do.
      /profiles/follow/atom
      /profiles/json
      /profiles/vcard
      /profiles/photo.do
      /profiles/audio.do
      URL Preview /connections/opengraph/basic/api/oembed
      /connections/thumbnail/basic/api/imageProxy
      Wikis /wikis/basic/api
      /wikis/follow/atom
  9. To get the activity stream on the Homepage to display, you must import an encrypted connection (SSL) certificate from the ISAM server to the nodes.
    1. Navigate to SSL certificate and key management > Key stores and certificates > CellDefaultTrustStore> \ signer certs.
    2. Restart the Homepage application.
    Note: To get the ECM events to appear, the ISAM certs have to be imported to the NodeDefaultTrustStore.
    If the ISAM server and the Web Seal server are different, you need to import the cert from the Web seal server.
  10. For Connections Content Manager configure an additional set of steps for the FileNet Collaboration Services:
    1. To add properties, the administrator needs to edit the fncs-sitePrefs.properties file, located in the FNCS installation directory, before running the configuration wizard.
      Note: For FNCS 2.0.3, the fncs-sitePrefs.properties file is located in <FNCS_HOME>/configure/explodedformat/fncs/WEB-INF/classes/. <FNCS_HOME> is the FNCS installation directory.
    2. Add the following properties to the fncs-sitePrefs.properties file at the end of the file after the comments and save it:
      fncsServerURL=http://your http url for the TAM and WebSeal proxy
      fncsServerURLSecure=https://your https url for the TAM and WebSeal proxy
      icUrl=https://your https url for the TAM and WebSeal proxy 

      For example:

      fncsServerURL=http://webseald.your_domain.com
      fncsServerURLSecure=https://webseald.your_domain.com
      icUrl=https://webseald.your_domain.com
    3. After setting the properties, you must complete the steps in Configuring FileNet Collaboration Services for the Connections Content Manager.
  11. Specify a dynamic URL pattern to support the Blogs application and mail notification:
    1. Create a dynamic URL configuration file named dynurl.conf. The dynurl.conf file is a plain text file that contains mappings from objects to patterns. Using a text editor, add the following content to the file:

      /blogs/blogsfeed /blogs/*/feed/*

      /blogs/blogsapi /blogs/*/api/*

      Save the file in the webseal-instance-docroot/lib directory. For example:
      • AIX: /usr/Tivoli/PDweb/www-default/lib
      • Linux: /opt/Tivoli/PDweb/www-default/lib
      • Windows: C:\Program Files\Tivoli\PDweb\www-default\lib
    2. To attach the bypass ACL that you defined in Step 7 a to the dynurl ACL, open the pdadmin command line utility and enter the following commands:

      acl attach /WebSEAL/isam_server-WebSEAL_instance/blogs/blogsfeed ic-bypass-acl

      acl attach /WebSEAL/isam_server-WebSEAL_instance/blogs/blogsapi ic-bypass-acl>

      where:
      • isam_server is the host name of the Security Access Manager server.
      • WebSEAL_instance is the name of the instance of the WebSEAL server that is configured to manage IBM Connections; for example: default.
      • ic-bypass-acl is the name of the access control list that you defined earlier.

      For example:

      acl attach /WebSEAL/server.name.example.com -default/blogs/blogsfeed open

    3. To allow large Blogs posts, open the webseald.conf file and add the following parameter:

      dynurl-allow-large-posts = yes

    4. To enable the uploading of PDF files, add the following parameter to the webseald.conf file:

      suppress-dynurl-parsing-of-posts = yes

  12. Configure Security Access Manager to use form-authentication over HTTPS by updating the webseald-server-name.conf file. Add the following line to the [forms] stanza:

    forms-auth = https

    Note: You cannot specify HTTP-only authentication. To specify both HTTP and HTTPS, add the following line: forms-auth = both.
  13. (Do not complete this step for Security Access Manager with SPNEGO) Add a Tivoli Allow access to the Embedded Experience gadget by adding the following line to the [ba] stanza in the webseald-server-name.conf file:

    ba-auth = none

  14. Configure content filtering by adding the following lines to the webseald-server-name.conf file:

    [filter-content-types]

    type = text/xml

    type = application/atom+xml

    [script-filtering]

    script-filter = yes

    rewrite-absolute-with-absolute = yes

  15. Configure recognition of double-byte character sets. Update the webseald-server-name.conf file:

    Add the following lines:

    decode-query = yes

    utf8-qstring-support-enabled = yes

  16. Configure Security Access Manager as the reverse proxy for IBM Connections. Update the webseald-server-name.conf file:

    Add the following line to the [server] stanza:

    web-host-name = fully-qualified-host-name

    Add the following line to the [session] stanza:

    use-same-session = yes

    Block TRACE HTTP method by setting or modifying the following entries:

    http-method-disabled-local = TRACE

    http-method-disabled-remote = TRACE

    Stop and restart your WebSEAL instance.

  17. Determine how you want the system to behave when users log out of IBM Connections. By default, when users click Log out in the SSO environment, they are not fully logged out of IBM Connections. Edit the IBM HTTP Server httpd.conf configuration file to implement the post-log out behavior. By default, the file is located in the following directory:
    • AIX: /usr/IBM/HTTPServer/conf
    • Linux: /opt/IBM/HTTPServer/conf
    • Windows: C:\IBM\HTTPServer\conf

    To capture requests to /ibm_security_logout and redirect them to /pkmslogout, add the following rewrite rules to the httpd.conf file:

    RewriteEngine On

    RewriteCond %{REQUEST_URI} /(.*)/ibm_security_logout(.*)

    RewriteRule ^/(.*) /pkmslogout [noescape,L,R]

    Note: You must add these rules to both the HTTP and HTTPS entries.

    Ensure that the line that enables mod_rewrite is not commented out by removing the preceding # symbol. For example:

    LoadModule rewrite_module modules/mod_rewrite.so

    The following example illustrates a typical portion of the httpd.conf file after you have implemented the steps described in this step:

    RewriteEngine On

    RewriteCond %{REQUEST_URI} /(.*)/ibm_security_logout(.*)

    RewriteRule ^/(.*) /pkmslogout [noescape,L,R]

    LoadModule ibm_ssl_module modules/mod_ibm_ssl.so

    <IfModule mod_ibm_ssl.c>

    Listen 0.0.0.0:443

    <VirtualHost *:443>

    ServerName connections.example.com

    SSLEnable

    RewriteEngine On

    RewriteCond %{REQUEST_URI} /(.*)/ibm_security_logout(.*)

    RewriteRule ^/(.*) /pkmslogout [noescape,L,R]

    </VirtualHost>

    </IfModule>

    SSLDisable

  18. Add an ErrorDocument 500 statement to the httpd.conf file. This statement appears in the user's browser if an IBM Connections application becomes unavailable.
  19. Save and close the httpd.conf file.
  20. Restart IBM HTTP Server.
  21. The value of the cookie timeout attribute in the LotusConnections-config.xml file must be smaller than the values of the timeout and inactive-timeout attributes in the webseald-server-name.conf file. Check these values in the [session] stanza of the webseald-server-name.conf file and edit them if necessary.
    Note: The values of the timeout parameters in the Security Access Manager configuration file are given in seconds but the CookieTimeout value in the LotusConnections-config.xml file is given in minutes.

    Use the following example as a guide:

    # Maximum lifetime (in seconds) for an entry in the credential cache

    # Setting this to zero allows entries in the cache to fill without expiry until the

    # cache contains the number of entries specified by max-entries. After that

    # point, entries are expired according to a least recently used algorithm.

    timeout = 3600

    # Lifetime (in seconds) of inactive entries in the credential cache.

    # To disable, set to 0.

    inactive-timeout = 600

  22. Restart your cluster: Stop all application servers and all nodes, and then restart the deployment manager, all the nodes, and all the application servers.