+

Search Tips   |   Advanced Search

Login mappings collection

Use this page to view a list of configurations for validating security tokens within incoming messages. Login mappings map an authentication method to a JAAS login configuration to validate the security token. Four authentication methods are predefined in the WAS: BasicAuth, Signature, IDAssertion, and LTPA (LTPA).

There is an important distinction between V5.x and V6 and later applications. The information in this article supports V5.x applications only that are used with WAS V6.0.x and later. The information does not apply to V6.0.x and later applications. To view this console page for the cell level...

  1. Click Security > Web services

  2. Under Additional properties, click Login mappings.

  3. Click New to create a new login mapping or click an existing configuration to modify its settings.

To view this console page for the server level, complete the following steps:

  1. Click Servers > Application servers > server.

  2. Under Security, click Web services: Default bindings for Web services security.

  3. Under Additional properties, click Login mappings.

  4. Click either New to create a new login mapping configuration or click the name of an existing configuration.

To view this console page for the application level, complete the following steps:

  1. Click Applications > Enterprise applications > application.

  2. Click Manage modules > URI_name.

  3. Under Web Services Security properties, click Web services: Server security bindings.

  4. Click Edit under Request receiver binding.

  5. Click Login mappings.

If you click Update runtime, the Web services security run time is updated with the default binding information, which is contained in the ws-security.xml file that was previously saved. After you specify the authentication method, the JAAS configuration name, and the Callback Handler Factory class name on this panel...

  1. Click Save in the messages section at the top of the administrative console.

  2. Click Update runtime. When you click Update runtime, the configuration changes made to the other Web services also are updated in the Web services security run time.

If the login mapping configuration is not found on the application level, the Web services run time searches for the login mapping configuration on the server level. If the configuration is not found on the server level, the Web services run time searches the cell.

Authentication method

[V5 only]

Specify the authentication method used for validating the security tokens. The following authentication methods are available:

BasicAuth

The basic authentication method includes both a user name and a password in the security token. The information in the token is authenticated by the receiving server and is used to create a credential.

Signature

The signature authentication method sends an X.509 certificate as a security token. For LDAP registries, the distinguished name (DN) is mapped to a credential, which is based on the LDAP certificate filter settings. For local OS registries, the first attribute of the certificate, usually the common name (CN) is mapped directly to a user name in the registry.

IDAssertion

The identity assertion method maps a trusted identity (ID) to a WebSphere Application Server credential. This authentication method only includes a user name in the security token. An additional token is included in the message for trust purposes. When the additional token is trusted, the IDAssertion token user name is mapped to a credential.

LTPA

validates an LTPA token.

JAAS configuration name

[V5 only]

Name of the Java Authentication and Authorization Service (JAAS) configuration.

Callback handler factory class name

[V5 only]

Name of the factory for the CallbackHandler class.



 

Related concepts


BasicAuth authentication method
Identity assertion authentication method
Signature authentication method
LTPA
Login mappings

 

Related tasks


Securing Web services for V5.x applications using XML digital signature

 

Related Reference

Login mapping configuration settings

 

Reference topic