Configure the server to support signature authentication
Configure the server to support signature authentication
Important distinction between Version 5.x and Version 6 applications
Note: The information in this article supports version 5.x applications only that are used with WebSphere Application Server Version 6. The information does not apply to version 6 applications.
Use this task to configure signature authentication at the server. Signature authentication refers to an X.509
certificate sent by the client to the server. The certificate is used to authenticate to the user registry configured at the server. After a request is received by the server that contains the certificate, the server needs to log in to form a credential. The credential is used for authorization. If the certificate supplied cannot be mapped to an entry in the user registry,
an exception is thrown and the request ends without invoking the resource.
For more information on signature authentication, see Signature authentication method.
Launch an assembly tool. For more information on the assembly tools, see Assembly tools.
Open the J2EE perspective by clicking Window > Open perspective > Other > J2EE .
Select Signature to authenticate the client using an X509
certificate. The certificate that is sent from the client is the certificate that issued for signing the message. You must be able to map this certificate to the configured user registry. For Local operating system (OS) registries, the common name (cn) of the distinguished name (DN)
is mapped to a user ID in the registry. For Lightweight Directory Access Protocol (LDAP), you can configure multiple mapping modes:
EXACT_DN is the default mode that directly maps the DN of the certificate to an entry in the LDAP server.
CERTIFICATE_FILTER is the mode that provides the LDAP advanced configuration with a place to specify a filter that maps specific attributes of the certificate to specific attributes of the LDAP server.