+

Search Tips   |   Advanced Search

CSIv2 inbound communications settings

Specify the features that a server supports for a client accessing its resources.

To view this administrative console page:

Use common secure interoperability (CSI) inbound communications settings for configuring the type of authentication information contained in an incoming request or transport.

Authentication features include three layers of authentication we can use simultaneously:


Propagate security attributes

Propagate additional security attributes, such as the authentication strength used, and the identity and location of the request originator. If not selected, the application server does not accept any additional login information to propagate to downstream servers.

Information Value
Default: Enabled

When using replication services, enable Propagate security attributes.


Use identity assertion

Assert identities from one appserver to another during downstream invocations. The appserver does not authenticate the asserted identity again because it trusts the upstream server. Identity assertion takes precedence over all other types of authentication. Identity assertion is performed in the attribute layer and is only applicable on servers. The principal determined at the server is based on precedence rules.

The identity asserted is the invocation credential determined by the RunAs mode for the enterprise bean. If the RunAs mode is Client, the identity is the client identity. If the RunAs mode is System, the identity is the server identity. If the RunAs mode is Specified, the identity is the one specified. The receiving server receives the identity in an identity token and also receives the sending server identity in a client authentication token. The receiving server validates the sending server identity as a trusted identity through the Trusted Server IDs entry box. Enter a list of pipe-separated (|) principal names, for example, serverid1|serverid2|serverid3.

All identity token types map to the user ID field of the active user registry. For an ITTPrincipal identity token, this token maps one-to-one with the user ID fields. For an ITTDistinguishedName identity token, the value from the first equal sign is mapped to the user ID field. For an ITTCertChain identity token, the value from the first equal sign of the distinguished name is mapped to the user ID field.

When authenticating to an LDAP user registry, the LDAP filters determine how an identity of type ITTCertChain and ITTDistinguishedName get mapped to the registry. If the token type is ITTPrincipal, then the principal gets mapped to the UID field in the LDAP registry.

Information Value
Default: Disabled


Trusted identities

Trusted identity sent from the sending server to the receiving server.

Pipe-separated (|) list of trusted server administrator user IDs, which are trusted to perform identity assertion to this server. For example, serverid1|serverid2|serverid3. The application server supports the comma (,) character as the list delimiter for backwards compatibility. The application server checks the comma character when the pipe character (|) fails to find a valid trusted server ID.

Use this list to decide whether a server is trusted. Even if the server is on the list, the sending server must still authenticate with the receiving server to accept the identity token of the sending server.

Information Value
Data type: String


Client certificate authentication

That authentication occurs when the initial connection is made between the client and the server during a method request.

In the transport layer, SSL client certificate authentication occurs. In the message layer, basic authentication (user ID and password) is used. Client certificate authentication typically performs better than message layer authentication, but requires some additional setup. These additional steps involve verifying that the server trusts the signer certificate of each client to which it is connected. If the client uses a certificate authority (CA) to create its personal certificate, we only need the CA root certificate in the server signer section of the SSL trust file.

When the certificate is authenticated to a LDAP user registry, the distinguished name (DN) is mapped based on the filter specified when configuring LDAP. When the certificate is authenticated to a local OS user registry, the first attribute of the distinguished name (DN) in the certificate, which is typically the common name, is mapped to the user ID in the registry.

The identity from client certificates is used only if no other layer of authentication is presented to the server.


Transport

Client processes connect to appservers using either SSL, TCP/IP or both as the inbound transport. If we specify TCP/IP, the server only supports TCP/IP and cannot accept SSL connections. If we specify SSL-supported, this server can support either TCP/IP or SSL connections. If we specify SSL-required, then any server communicating with this one must use SSL.

Provide a fixed port number for the following ports. A zero port number indicates that a dynamic assignment is made at run time.


SSL settings

List of predefined SSL settings to choose from for inbound connection.


Message layer authentication

The following options are available for message layer authentication:

Allow client to server message layer authentication with:

If we select Basic Authentication and LTPA, and the active authentication mechanism is LTPA, a user name, password, and LTPA tokens are accepted.

If we select Basic Authentication and KRB5 and the active authentication mechanism is KRB5, a user name, password, Kerberos token and LTPA tokens are accepted.

If we do not select Basic Authentication, a user name and password are not accepted by the server.


Login configuration

Type of system login configuration to use for inbound authentication. We can add custom login modules by clicking...


Stateful sessions

Select this option to enable stateful sessions, which are used mostly for performance improvements. The first contact between a client and server must fully authenticate. However, all subsequent contacts with valid sessions reuse the security information. The client passes a context ID to the server, and the ID is used to look up the session. The context ID is scoped to the connection, which guarantees uniqueness. Whenever the security session is not valid and the authentication retry is enabled, which is the default, the client-side security interceptor invalidates the client-side session and submits the request again without user awareness. This situation might occur if the session does not exist on the server; for example, the server failed and resumed operation. When this value is disabled, each method invocation must authenticate again.

Information Value
Default: Enabled


Trusted authentication realms - inbound

Select this link to establish inbound trust for realms. Inbound authentication realm settings are not specific to CSIv2; we can also configure which realms to grant inbound trust to for multiple security domains. Inbound authentication refers to the configuration that determines the type of accepted authentication for inbound requests. This authentication is advertised in the interoperable object reference (IOR) that the client retrieves from the name server.

See also: