Scenario: Enabling single sign-on for i5/OS

 

Here are the prerequisites and objectives for enabling single sign-on for the i5/OS® operating system.

 

Situation

You are a network administrator that manages a network and network security for your company, including the Order Receiving department. You oversee the IT operations for a large number of employees who take customer orders over the telephone. You also supervise two other network administrators who help you maintain the network.

The employees in the Order Receiving department use Windows® 2000 and i5/OS and require multiple passwords for the different applications they use every day. Consequently, you spend a lot of time managing and troubleshooting problems related to passwords and user identities, such as resetting forgotten passwords.

As the company's network administrator, you are always looking for ways to improve the business, starting with the Order Receiving department. You know that most of your employees need the same type of authority to access the application that they use to query inventory status. It seems redundant and time consuming for you to maintain individual user profiles and numerous passwords that are required in this situation. In addition, you know that all of your employees can benefit by using fewer user IDs and passwords. You want to do these things:

Based on your research, you know that i5/OS supports single sign-on, a solution that allows your users to log on once to access multiple applications and services that normally require them to log on with multiple user IDs and passwords. Because your users do not need to provide as many user IDs and passwords to do their jobs, you have fewer password problems to solve for them. Single sign-on seems to be an ideal solution because it allows you to simplify password management in the following ways:

This scenario has the following advantages:

 

Objectives

In this scenario, you are the administrator at MyCo, Inc., who wants to enable single sign-on for the users in the Order Receiving department.

The objectives of this scenario are as follows:

 

Details

The following figure illustrates the network environment for this scenario.

The figure illustrates the following points relevant to this scenario.

EIM domain data defined for the enterprise

Windows 2000 server

System A

System B

Administrative PC

 

Prerequisites and assumptions

Successful implementation of this scenario requires that the following assumptions and prerequisites are met:

  1. All system requirements, including software and operating system installation, have been verified.

    To verify that these licensed programs have been installed, follow these steps:

    1. In iSeries Navigator, expand your system > Configuration and Service > Software > Installed Products.

    2. Ensure that all the necessary licensed programs are installed.

      The Network Authentication Service APIs support job environments for most EBCDIC CCSIDs. However, CCSID 290 and 5026 are not supported because of the variance of lowercase letters a to z.

  2. All necessary hardware planning and setup are complete.

  3. TCP/IP and basic system security are configured and tested on each system.

  4. The directory server and EIM should not be previously configured on System A.

    Instructions in this scenario are based on the assumption that the directory server has not been previously configured on System A. However, if you already configured the directory server, you can still use these instructions with only slight differences. These differences are noted in the appropriate places within the configuration steps.

  5. A single DNS server is used for host name resolution for the network. Host tables are not used for host name resolution.

    The use of host tables with Kerberos authentication might result in name resolution errors or other problems. For more detailed information about how host name resolution works with Kerberos authentication, see Host name resolution considerations.

 

Configuration steps

You need to thoroughly understand the concepts related to single sign-on, which include network authentication service and Enterprise Identity Mapping (EIM) concepts, before you implement this scenario. See the following information to learn about the terms and concepts related to single sign-on:

To configure single sign-on on your system, complete these steps.

 

Parent topic:

Scenarios: Using network authentication service in a Kerberos network

Related concepts
Single sign-on overview Domains