Use this page to specify the features that a server supports for a client accessing its resources.
To view this administrative console page, complete the following steps:
Use common secure interoperability (CSI) inbound authentication settings for configuring the type of authentication information that is contained in an incoming request or transport. Authentication features include three layers of authentication that you can use simultaneously:
Configuration tab
That basic authentication occurs over the message layer.
Basic authentication occurs in the message layer. This type of authentication typically involves sending a user ID and a password from the client to the server for authentication.
This authentication also involves delegating a credential token from an already authenticated credential, provided the credential type is forwardable, for example, Lightweight Third Party Authentication (LTPA).
If you click Basic Authentication and LTPA is the configured authentication protocol, user name, password, and LTPA tokens are accepted. The following options are available for Basic Authentication:
Basic authentication takes precedence over client certificate authentication, if both are performed.
That authentication occurs when the initial connection is made between the client and the server during a method request.
In the transport layer, Secure Sockets Layer (SSL) client certificate authentication occurs. In the message layer, basic authentication (user ID and password) is performed. Client certificate authentication typically performs better than message layer authentication, but requires some additional setup. These additional steps involve verifying that the server trusts the signer certificate of each client to which it is connected. If the client uses a certificate authority (CA) to create its personal certificate, you only need the CA root certificate in the server signer section of the SSL trust file.
When the certificate is authenticated to a Lightweight Directory Access Protocol (LDAP) user registry, the distinguished name (DN) is mapped based on the filter that is specified when configuring LDAP. When the certificate is authenticated to a local OS user registry, the first attribute of the distinguished name (DN) in the certificate, which is typically the common name, is mapped to the user ID in the registry.
The identity from client certificates is used only if no other layer of authentication is presented to the server.
Use this list to decide whether a server is trusted. Even if the server is on the list, the sending server must still authenticate with the receiving server to accept the identity token of the sending server.
Data type | String |
Select this option to enable stateful sessions, which are used mostly for performance improvements.
The first contact between a client and server must fully authenticate. However, all subsequent contacts with valid sessions reuse the security information. The client passes a context ID to the server, and the ID is used to look up the session. The context ID is scoped to the connection, which guarantees uniqueness. Whenever the security session is not valid and the authentication retry is enabled, which is the default, the client-side security interceptor invalidates the client-side session and submits the request again without user awareness. This situation might occur if the session does not exist on the server (the server failed and resumed operation). When this value is disabled, every method invocation must authenticate again.
Data type | String |
The type of system login configuration to use for inbound authentication.
You can add custom login modules by clicking Security > Global security. Under Authentication, click JAAS configuration > System logins.
Select this option to support security attribute propagation during login requests. When you select this option, the application server retains additional information about the login request, such as the authentication strength used, and retains the identity and location of the request originator.
Verify that you are using Lightweight Third Party Authentication (LTPA) as your authentication mechanism. LTPA is the only authentication mechanism supported when you enable the security attribute propagation feature.
To configure LTPA, click Security > Global security. Under Authentication, click Authentication mechanisms > LTPA.
If you do not select this option, the application server does not accept any additional login information to propagate to downstream servers.
Related reference
System login configuration entry settings for Java Authentication and Authorization Service
Lightweight Third Party Authentication settings