+

Search Tips   |   Advanced Search

System login configuration entry settings for JAAS

Specify a list of JAAS system login configurations.

Do not remove the following system login modules:

LTPA_WEB and WEB_INBOUND perform similar functions. IBM recommends that we use WEB_INBOUND since it is the newer of the system login modules.


RMI_INBOUND, WEB_INBOUND, DEFAULT

Process inbound login requests for Remote Method Invocation (RMI), web applications, and most of the other login protocols.

These three login configurations will pass in the following callback information, which is handled by the login modules within these configurations. These callbacks are not passed in at the same time. However, the combination of these callbacks determines how the application server authenticates the user.

In system login configurations, the application server authenticates the user based upon the information that is collected by the callbacks. However, a custom login module does not need to act upon any of these callbacks. The following list explains the typical combinations of these callbacks:

In addition to the callbacks defined previously, the WEB_INBOUND login configuration can contain the following additional callbacks only:

To use security attribute propagation with the WEB_INBOUND login configuration, we can enable the Web inbound security attribute propagation option on the Single sign-on panel.

The following login modules are predefined for the RMI_INBOUND, WEB_INBOUND, and DEFAULT system login configurations. We can add custom login modules before, between, or after any of these login modules, but we cannot remove these predefined login modules:


RMI_OUTBOUND

Process RMI requests sent outbound to another server when either the com.ibm.CSI.rmiOutboundLoginEnabled or the com.ibm.CSIOutboundPropagationEnabled properties are true.

These properties are set in the CSIv2 authentication panel. To access the panel:

To set the com.ibm.CSI.rmiOutboundLoginEnabled property, select Custom outbound mapping. To set the com.ibm.CSIOutboundPropagationEnabled property, select the Security attribute propagation option. This login configuration determines the security capabilities of the target server and its security domain. When the application server sends both the authentication and authorization information downstream, the application server removes the need to access the user registry again and look up the security attributes of the user for authorization purposes. Additionally, any custom objects that are added at the sending server are present in the Subject at the downstream server.

The following callback is available in the RMI_OUTBOUND login configuration. Use the com.ibm.wsspi.security.csiv2.CSIv2PerformPolicy object returned by this callback to query the security policy for this particular outbound request. This query can help determine if the target realm is different than the current realm and if the application server must map the realm. See "Configuring outbound mapping to a different target realm" in the information center.

The following login module is predefined in the RMI_OUTBOUND login configuration. We can add custom login modules before, between, or after any of these login modules, but we cannot remove these predefined login modules.

See "Configuring outbound mapping to a different target realm" in the information center.

SWAM

Process login requests in a single server environment when Simple WebSphere Authentication Mechanism (SWAM) is used as the authentication method. SWAM does not support forwardable credentials. When SWAM is the authentication method, the application server cannot send requests from server to server. In this case, we must use LTPA. The SWAM login configuration is deprecated and will be removed in a future release.


wssecurity.IDAssertion

Process login configuration requests for Web Services Security using identity assertion. This login configuration is for Web Services Security Draft 13 JAX-RPC (v5.x) applications. See "Identity assertion authentication method" in the information center.


wssecurity.IDAssertionUsernameToken

Process login configuration requests for Web Services Security using identity assertion. This login configuration is for Web Services Security V1.0 JAX-RPC applications.

The custom property com.ibm.wsspi.wssecurity.auth.module.IDAssertionLoginModule.disableUserRegistryCheck can be configured for the JAAS IDAssertionUsernameToken login module. This property is an option for the Web Services Security identity assertion JAAS login module, wssecurity.IDAssertionUsernameToken. The property indicates that the login module should not perform a user registry check when processing an inbound identity token.


wssecurity.PKCS7

Verifies an X.509 certificate with a certificate revocation list in a Public Key Cryptography Standards #7 (PKCS7) object. This login configuration is for v6.0.x systems.


wssecurity.PkiPath

Verify an X.509 certificate with a public key infrastructure (PKI) path. This login configuration is for v6.0.x systems.


wssecurity.signature

Process login configuration requests for Web Services Security using digital signature validation.

This login configuration is for v5.x systems.


wssecurity.UsernameToken

Verify basic authentication (user name and password). When using the JAX-RPC runtime, the following custom properties can be configured for the JAAS UsernameToken login module:


wssecurity.X509BST

Verify an X.509 binary security token (BST) by checking the validity of the certificate and the certificate path. This login configuration is for v6.0.x systems.


LTPA_WEB

Process login requests to components in the web container such as servlets and JavaServer pages (JSP) files. The com.ibm.ws.security.web.AuthenLoginModule login module is predefined in the LTPA login configuration. We can add custom login modules before or after this module in the LTPA_WEB login configuration. The LTPA_WEB login configuration can process the HttpServletRequest object, the HttpServletResponse object, and the web application name passed in using a callback handler. For more information, see "Example: Customizing a server-side Java Authentication and Authorization Service authentication and logon configuration" in the information center.


LTPA

Process login requests that are not handled by the LTPA_WEB login configuration. This login configuration is used by WAS v6.1 and previous versions. The com.ibm.ws.security.server.lm.ltpaLoginModule login module is predefined in the LTPA login configuration. We can add custom login modules before or after this module in the LTPA login configuration. See "Example: Customizing a server-side JAAS authentication and logon configuration" in the information center.


DESERIALIZE_ASYNCH_CONTEXT

Process login requests for asynchronous beans. The DESERIALIZE_ASYNCH_CONTEXT configuration is used for asynchronous beans only. The scheduler uses the asynchronous beans alarm manager for "Deferred Start", which allows serialization and deserialization of the J2EE context. This login configuration is used when using asynchronous beans, Scheduler, and EJB Timers. The DESERIALIZE_ASYNCH_CONTEXT login configuration has a limitation. Any operation that requires token validation in the lognModules configured in the DESERIALIZE_ASYNC_CONTEXT login configuration can result in the API repeatedly throwing the TokenExpiredException.


Related:

  • JAAS
  • Security attribute propagation
  • Default implementations of the Web Services Security service provider programming interfaces
  • Configure programmatic logins for JAAS
  • Configure outbound identity mapping to a different target realm
  • Configure inbound identity mapping
  • Customize a server-side JAAS authentication and login configuration
  • Configuration entry settings for JAAS
  • Example: Custom login module for inbound mapping