Reusing group information
During the authentication of a user, IBM WebSphere Application Server stores information about which groups users belong to. This information is static for the authentication session of the user. In addition, it can be provided by an External Security Manager via a Trust Association Interceptor. In this case IBM WAS does not load the information on its own. IBM WebSphere Portal can participate in this flow and reuse the information from the WAS security context instead of retrieving it from the LDAP server. This function is also referred to as group assertion or WAS group assertion.
To prevent modifying existing behavior of environment or losing existing group information, WebSphere Portal does not reuse group information by default. For this reason configure WebSphere Portal to reuse group information from the WAS security context. You can choose to reuse group information for user management or for access control.
The recommended option is for user management, as this case will provide the performance and functional enhancements. The second option for access control is used in very specific scenarios, typically as directed by IBM Support or IBM technical documentation. Please do not combine both options as this will lead to high CPU load on system.
- Reusing group information for user management allows you to have all components of WebSphere Portal benefit from the faster group membership lookup. During the authentication session the membership of the current user is based on the information provided by WAS. This will reduce load on LDAP server, increase authentication performance and it allows you to define group membership at the authentication layer.
- Reusing group information for access control enables the system to react on possible per request changes of the WebSphere Security context. By default the Security context is not modifiable during an authentication session, but WAS provides plug points which allow the execution of a Trust Association Interceptor on every request which could be used to establish a new security Subject on every request. In this case Portal Access Control would be able to work with the updated subject information and would build a dynamic environment. However, this option requires more system resources, custom extensions to WAS security and impacts performance.
To reuse group information:
- Log on to the WAS administrative console (or Deployment Manager if in a cluster).
- Navigate to Resources -> Resource Environment -> Resource Environment Providers.
- Choose the appropriate option(s) to reuse group information:
- To reuse group information for user management, the first option used typically as an enhancement, do the following:
- Select the WP_PumaStoreService resource environment provider.
- Select Custom properties.
- Click New.
- Enter store.puma_default.filter.assertionFilter.classname in the Name field.
- Enter com.ibm.wps.um.AssertionFilter in the Value field.
- Click Apply.
- Click Save to save the changes to the master configuration.
- To reuse group information for access control, the second option used in very specific scenarios, do the following:
- Select the WP PACGroupManagementService resource environment provider.
- Select Custom properties.
- Click New.
- Enter accessControlGroupManagement.useWSSubject in the Name field.
- Enter true in the Value field.
- Click Apply.
- Click Save to save the changes to the master configuration.
- Log out of the administrative console.
- Restart the WebSphere_Portal server.
Parent
Users and groups
274130 Oct 1, 2010 10:15:35 AM