Login mappings collection

Use this page to view a list of configurations for validating security tokens within incoming messages. Login mappings map an authentication method to a Java Authentication and Authorization Service (JAAS) login configuration to validate the security token. Four authentication methods are predefined in the WebSphere Application Server: BasicAuth, Signature, IDAssertion, and Lightweight Third Party Authentication (LTPA). Important distinction between V5.x and v6.x applications

Note: The information in this article supports v5.x applications only that are used with WAS v6.x. The information does not apply to v6.0.x applications.

To view this administrative console page for the cell level, complete the following steps:

  1. Click Security > Web services

  2. Under Additional properties, click Login mappings.

  3. Click New to create a new login mapping or click an existing configuration to modify its settings.

To view this administrative console page for the server level, complete the following steps:

  1. Click Servers > Application servers > servername.

  2. Under Security, click Web services: Default bindings for Web services security.

  3. Under Additional properties, click Login mappings.

  4. Click either New to create a new login mapping configuration or click the name of an existing configuration.

To view this administrative console page for the application level, complete the following steps:

  1. Click Applications > Enterprise applications > appname.

  2. Under Related items, click EJB modules or Web modules > URI_name.

  3. Under Additional properties, click Web services: Server security bindings.

  4. Click Edit under Request receiver binding.

  5. Click Login mappings.

If you click Update runtime, the Web services security run time is updated with the default binding information, which is contained in the ws-security.xml file that was previously saved. After you specify the authentication method, the Java Authentication and Authorization Service (JAAS) configuration name, and the Callback Handler Factory class name on this panel, complete the following steps:

  1. Click Save in the messages section at the top of the administrative console.

  2. Click Update runtime. When you click Update runtime, the configuration changes made to the other Web services also are updated in the Web services security run time.

Important: If the login mapping configuration is not found on the application level, the Web services run time searches for the login mapping configuration on the server level. If the configuration is not found on the server level, the Web services run time searches the cell.

Authentication method

Specifies the authentication method used for validating the security tokens.

The following authentication methods are available:

BasicAuth

The basic authentication method includes both a user name and a password in the security token. The information in the token is authenticated by the receiving server and is used to create a credential.

Signature

The signature authentication method sends an X.509 certificate as a security token. For Lightweight Directory Access Protocol (LDAP) registries, the distinguished name (DN) is mapped to a credential, which is based on the LDAP certificate filter settings. For local OS registries, the first attribute of the certificate, usually the common name (CN) is mapped directly to a user name in the registry.

IDAssertion

The identity assertion method maps a trusted identity (ID) to a WAS credential. This authentication method only includes a user name in the security token. An additional token is included in the message for trust purposes. When the additional token is trusted, the IDAssertion token user name is mapped to a credential.

LTPA

Lightweight Third Party Authentication (LTPA) validates an LTPA token.

JAAS configuration name

Name of the Java Authentication and Authorization Service (JAAS) configuration.

Callback handler factory class name

Name of the factory for the CallbackHandler class.


 

See Also


BasicAuth authentication method
Identity assertion authentication method
Signature authentication method
Lightweight Third Party Authentication