+

Search Tips   |   Advanced Search

Create a single sign-on for HTTP requests using SPNEGO Web authentication

Create single sign-ons for HTTP requests using the Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) web authentication for WebSphere Application Server requires the performance of several distinct, yet related functions that when completed, allow HTTP users to log in and authenticate to the Microsoft domain controller only once at their desktop and to receive automatic authentication from the WAS.

In WAS v6.1, a trust association interceptor (TAI) that uses the SPNEGO to securely negotiate and authenticate HTTP requests for secured resources was introduced. This function was deprecated in WAS v7.0. SPNEGO web authentication has taken its place to provide the following enhancements:

We can enable either SPNEGO TAI or SPNEGO Web Authentication but not both.

Read about Single sign-on for HTTP requests using SPNEGO web authentication for a better understanding of what SPNEGO Web Authentication is and how it is supported in this version of WAS.

Before starting this task, complete the following checklist:

The objective of this machine arrangement is to permit users to successfully access WAS resources without having to authenticate again and thus achieve Microsoft Windows desktop single sign-on capability.

Configure the members of this environment to establish Microsoft Windows single sign-on involves specific activities that are performed on three distinct machines:

Continue with the following steps to create a single sign-on for HTTP requests using SPNEGO Web authentication:


Tasks

  1. Create a Kerberos service principal (SPN) and keytab file on your Microsoft domain controller machine

    1. Configure your domain controller machine to create single sign-ons for HTTP requests using the Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) web authentication for WebSphere Application Server. Configure the Microsoft Windows Server running the Active Directory Domain Controller and associated Kerberos Key Distribution Center (KDC).Read the Configuring your domain controller machine to create single sign-ons for HTTP requests using SPNEGO article for more information.

  2. Create a Kerberos configuration file

    1. The IBM implementation of the Java Generic Security Service (JGSS) and KRB5 require a Kerberos configuration file (krb5.conf or krb5.ini) on each node or JVM. In this release of WAS, this configuration file should be placed in the config/cells/cell directory so that all application servers can access this file. If we do not have a Kerberos configuration file, use a wsadmin command to create one. Read the Creating a Kerberos configuration article for more information.

  3. Configure and enable SPNEGO web authentication using the administrative console on our WAS machine

    1. We can enable and configure the Simple and Protected GSS-API Negotiation (SPNEGO) as the web authenticator for the application server using the administrative console on the WAS machine. Read the Enable and configure SPNEGO web authentication using the administrative console article for more information.

  4. Configure the client application on the client application machine

    1. Client-side applications are responsible for generating the SPNEGO token. You begin this configuration process by configuring the web browser to use SPNEGO authentication. Read the Configuring the client browser to use SPNEGO article for more information.

  5. Create SPNEGO tokens for J2EE, .NET, Java, web service clients for HTTP requests (optional)

    1. Create a Simple and Protected GSS-API Negotiation (SPNEGO) token for the applications and insert this token into the HTTP headers to authenticate to the WAS. Read the Creating SPNEGO tokens for J2EE, .NET, Java, web service clients for HTTP requests article for more information.


Related:

  • Single sign-on for HTTP requests using SPNEGO web authentication
  • Create a Kerberos service principal (SPN) and keytab file on your Microsoft domain controller machine
  • Create a Kerberos configuration file
  • Enable and configure SPNEGO web authentication
  • Configure the client browser to use SPNEGO
  • Create SPNEGO tokens for J2EE, .NET, Java, web service clients for HTTP requests
  • Implement single sign-on to minimize web user authentications
  • Create a Kerberos service principal name and keytab file
  • Create a Kerberos service principal and keytab file used by the WAS SPNEGO TAI (deprecated)
  • SPNEGO web authentication configuration commands
  • SPNEGO web authentication filter commands
  • SPNEGO troubleshooting tips