Access problems after enabling security

 

What kind of error are you seeing?

  1. Unable to access the administrative console or use wsadmin.sh after enabling security

  2. Unable to access a Web page after enabling security

  3. Authentication error accessing a Web page

  4. Authorization error accessing a Web page

  5. The client cannot access an enterprise bean after enabling security

  6. The client never gets prompted when accessing a secured enterprise bean

  7. Unable to stop an appserver, node manager, or node after enabling security

  8. AccessControlException is reported in SystemOut.log.

  9. After enabling single signon, I cannot log on to the administrative console.

  10. Troubleshooting the security component.

  11. Obtaining help from IBM.

 

Unable to access the administrative console or use wsadmin.sh after enabling security

 

Unable to access a Web page after enabling security

When secured resources are not accessible, probable causes include...

 

The client cannot access an enterprise bean after enabling security

If client access to an enterprise bean fails after security is enabled...

If org.omg.CORBA.NO_PERMISSION exceptions occur when programmatically logging on to access a secured enterprise bean, an authentication exception has occurred on the server. Typically the CORBA exception is triggered by an underlying com.ibm.WebSphereSecurity.AuthenticationFailedException. To determine the actual cause of the authentication exception, examine the full trace stack...

  1. Begin by viewing the text in the exception, following WSSecurityContext.acceptSecContext(), reason:. Typically, this text describes the failure without further analysis.

  2. If this action does not describe the problem, look up the CORBA minor code.

    For example, the following exception indicates a CORBA minor code of 49424300.

    org.omg.CORBA.NO_PERMISSION: Caught WSSecurityContextException in WSSecurityContext.acceptSecContext(),
    reason: Major Code[0] Minor Code[0] Message[ Exception caught invoking authenticateBasicAuthData from SecurityServer for user jdoe.
    Reason: com.ibm.WebSphereSecurity.AuthenticationFailedException] minor code: 49424300 completed: No at com.ibm.ISecurityLocalObjectBaseL13Impl. PrincipalAuthFailReason.map_auth_fail_to_minor_code (PrincipalAuthFailReason.java:83)

    The explanation of this error in the CORBA minor code table reads:

    authentication failed error.

    The user ID or password supplied by the client program is probably invalid

If you get...

CORBA INITIALIZE exception with JSAS1477W: SECURITY CLIENT/SERVER CONFIGURATION MISMATCH error embedded

This indicates that the security configuration for the server differs from the client in some fundamental way. The full exception message lists the specific mismatches. For example, the following exception lists three errors

Exception received: org.omg.CORBA.INITIALIZE: JSAS1477W: SECURITY CLIENT/SERVER CONFIG MISMATCH:
The client security configuration (sas.client.props or outbound settings in GUI) does not support the server security configuration for the following reasons:
ERROR 1: JSAS0607E: The client requires SSL Confidentiality but the server does not support it.
ERROR 2: JSAS0610E: The server requires SSL Integrity but the client does not support it.
ERROR 3: JSAS0612E: The client requires client (e.g., userid/password or token), but the server does not support it.
minor code: 0
completed: No
at com.ibm.ISecurityLocalObjectBaseL13Impl.SecurityConnectionInterceptor.getConnectionKey(SecurityConnectionInterceptor.java:1770)

In general, resolving the problem requires a change to the security configuration of either the client or the server. To determine which configuration setting is involved, look at the text following the JSAS error message.

In these particular cases...

Similarly, an exception like org.omg.CORBA.INITIALIZE: JSAS0477W: SECURITY CLIENT/SERVER CONFIG MISMATCH: appearing on the server trying to service a client request indicates a security configuration mismatch between client and server. The steps for resolving the problem are the same as for the JSAS1477W exceptions previously described.

 

Client program never gets prompted when accessing secured enterprise bean

Even though it appears security is enabled and an enterprise bean is secured, it can happen that the client executes the remote method without prompting. If the remote method is protected, an authorization failure results. Otherwise, execute the method as an unauthenticated user.

Possible reasons for this problem include...

 

Cannot stop an appserver, node manager, or node after enabling security

If you use command line utilities to stop WAS processes, apply additional parameters after enabling security to provide authentication and authorization information.

Use the ./stopServer.sh -help command to display the parameters to use.

Use the following command options after enabling security...

stopServer.sh hostname -username name -password password
stopNode.sh -username name -password password
stopManager.sh -username name -password password

 

After enabling single signon, cannot log on to the administrative console

This problem occurs when single signon is enabled, and you attempt to access the administrative console using the short name of the server, for example...

http://myserver:9090/admin

The server accepts your user ID and password, but returns you to the log on page instead of the administrative console.

To correct this problem, use the fully qualified host name of the server, for example...

http://myserver.mynetwork.companyname.com:9090/admin

 

See Also

Troubleshooting by component: What is not working?
Errors after enabling security