WebSphere

 

Portal Express, Version 6.0
Operating systems: i5/OS, Linux, Windows

 

FIPS compliance with WebSphere Portal Express

This section provides information about Federal Information Processing Standards (FIPS) and how they comply with IBM® WebSphere® Portal Express.

Federal Information Processing Standards (FIPS) are standards and guidelines issued by the United States National Institute of Standards and Technology (NIST) for federal government computer systems. FIPS are developed when there are compelling federal government requirements for standards, such as for security and interoperability, but acceptable industry standards or solutions do not exist. WebSphere Portal Express provides toleration for WebSphere Application Server's support of FIPS 140-2. WebSphere Application Server Version 6.0 and later integrates cryptographic modules such as Java Secure Socket Extension (JSSE) and Java Cryptography Extension (JCE), which are FIPS 140-2 certified. Throughout the documentation and the product, the FIPS 140-2 certified IBM JSSE and JCE modules are referred to as IBMJSSEFIPS and IBMJCEFIPS, which distinguishes the FIPS-certified modules from the prior, non-certified IBM JSSE and IBM JCE modules. For more information on the FIPS certification process, to see a list of validated modules, or to check the status of current IBM submissions, see the Related Information below.

WebSphere Portal Express toleration of the FIPS 140-2 compliant WebSphere Application Server configuration means that WebSphere Portal Express will continue to work normally after WebSphere Application Server is configured to activate FIPS 140-2 compliant security modules. The WebSphere Portal Express product has no self-contained cryptographic support and as a result is unaware of the module differences. Functions in WebSphere Portal Express that use encryption include:

It is assumed, though not required, that all the connections listed above will be carried over SSL using FIPS-compliant encryption. Without FIPS 140-2 support connections may not be encrypted. And there is no requirement that every connection be SSL, even with FIPS-enabled cryptography over TLS, but again your connection may be unencrypted. Note that FIPS 140-2 enablement requires HTTP Server and LDAP server versions that provide support for FIPS 140-2. Consult the documentation for your HTTP server and LDAP server to determine your level of support. This section describes how to set up WebSphere Portal Express to use SSL. You may do these WebSphere Portal Express setup steps either before or after activating WebSphere Application Server's FIPS 140-2 support. See the WebSphere Application Server directions in their documentation. Here is a summary of the setup steps to activate SSL in WebSphere Portal Express:

  1. Installing

  2. Configuring security

  3. Set up Transport Layer Security (TLS) for the internal HTTP Server in WebSphere Application Server. Refer to the "Configuring Federal Information Processing Standard Java Secure Socket Extension files" topic in the WebSphere Application Server Information Center for detailed instructions.

  4. Optional: If your LDAP server supports TLS with FIPS enabled, you will:

    1. Set up your LDAP server over SSL.

    2. Enable TLS FIPS on the LDAP server. Refer to the product documentation for your LDAP server for detailed instructions.

  5. Optional: Configure your HTTP server to support TLS with FIPS enabled. Refer to the HTTP server documentation for detailed instructions.

 

Limitations

There are some restrictions in the level of support that WebSphere Portal Express provides in using FIPS-certified modules:

 

Related information

 

Parent topic:

Additional LDAP configuration