Configure single sign-on capability with Tivoli Access Manager or WebSEAL
Use the following information to enable single sign-on to WebSphere Application Server using either WebSEAL or the plug-in for web servers.
Either Tivoli Access Manager WebSEAL or Tivoli Access Manager plug-in for web servers can be used as reverse proxy servers to provide access management and single sign-on (SSO) capability to WebSphere Application Server resources. With such an architecture, either WebSEAL or the plug-in authenticates users and forwards the collected credentials to WebSphere Application Server in the form of an IV Header. Two types of single sign-on are available, the TAI interface and the TAI++ interface, so named as both use WebSphere Application Server trust association interceptors (TAI). With the TAI, the end-user name is extracted from the HTTP header and forwarded to embedded Tivoli Access Manager where the end-user name is used to construct the client credential information and authorize the user. With the TAI++, all of the user credential information is available in the HTTP header and not just the user name. The TAI++ is the more efficient of the two solutions because a LDAP call is not required. TAI functionality is retained for backwards compatibility.
Complete the following tasks to enable single sign-on to WebSphere Application Server using either WebSEAL or the plug-in for web servers. These tasks assume that embedded Tivoli Access Manager is configured for use.
- Create a trusted user account for Tivoli Access Manager in the shared LDAP user registry. For more information, see Create a trusted user account in Tivoli Access Manager.
- Configure either WebSEAL or the Tivoli Access Manager plug-in for Web servers to work with WebSphere Application Server. For more information, see either of the following articles:
- Configure WebSEAL for use with WebSphere Application Server
- Configure Tivoli Access Manager plug-in for web servers for use with WebSphere Application Server
- Configure single sign-on using either the TAI or TAI++ interface. For more information, see either of the following articles:
- Configure single sign-on using trust association
- Configure single sign-on using trust association interceptor ++
Subtopics
- Single sign-on settings
Use this page to set the configuration values for single sign-on (SSO).
- com.tivoli.pd.jcfg.PDJrteCfg utility for Tivoli Access Manager single sign-on
The com.tivoli.pd.jcfg.PDJrteCfg utility configures the Java Runtime Environment component for Tivoli Access Manager. This utility enables Java applications to use the Tivoli Access Manager policy and authorization servers.
- com.tivoli.pd.jcfg.SvrSslCfg utility for Tivoli Access Manager single sign-on
The utility is used to configure and remove the configuration information associated with WebSphere Application Server and the Tivoli Access Manager server.
- Create a trusted user account in Tivoli Access Manager
Tivoli Access Manager trust association interceptors require the creation of a trusted user account in the shared LDAP user registry.
- Configure WebSEAL for use with WebSphere Application Server
Use this topic to set the SSO password in WebSEAL for single sign-on to WebSphere Application Server.
- Configure Tivoli Access Manager plug-in for web servers for use with WebSphere Application Server
Tivoli Access Manager plug-in for web servers can be used as a security gateway for the protected WebSphere Application Server resources.
- Configure single sign-on using trust association
This task is performed to enable single sign-on using trust association. Trust association is used to connect reversed proxy servers to the application server.
- Configure single sign-on using trust association interceptor ++
Perform this task to enable single sign-on using trust association interceptor ++. The steps involve setting up trust association and creating the interceptor properties.
- Configure global sign-on principal mapping
We can create a new application login that uses the Tivoli Access Manager GSO database to store the login credentials.
Related tasks
Implement single sign-on to minimize web user authentications