Authentication process flow for MPA and multiple clients
- The WebSEAL administrator performs the following preliminary configuration:
- Enable support for multiplexing proxy agents.
- Create an ISAM account for the specific MPA gateway.
- Add this MPA account to the webseal-mpa-servers group.
- Clients connect to the MPA gateway.
- The gateway translates the request to an HTTP request.
- The gateway authenticates the client.
- The gateway establishes a connection with WebSEAL with the client request.
- The MPA authenticates to WebSEAL (using a method distinct from the client) and an identity is derived for the MPA (which already has a WebSEAL account).
- WebSEAL verifies the MPA’s membership in the webseal-mpa-servers group.
- A credential is built for the MPA and flagged as a special MPA type in the cache.
Although this MPA credential accompanies each future client request, it is not used for authorization checks on these requests.
- Now WebSEAL needs to further identify the owner of the request.
The MPA is able to distinguish the multiple clients for proper routing of login prompts.
- The client logs in and authenticates using a method distinct from the authentication type used for the MPA.
- WebSEAL builds a credential from the client authentication data.
- Session data type used by each client must be distinct from the session data type used by the MPA.
- The authorization service permits or denies access to protected objects based on the user credential and the object’s ACL permissions.
Parent topic: Multiplexing proxy agents