![]() Operating systems: i5/OS, Linux,Windows |
You can configure IBM® Tivoli® Access Manager for e-business to perform authorization as an independent task from configuring Tivoli Access Manager to perform authentication, but configure both tasks. Using Tivoli Access Manager to perform only authorization is not supported.
There are additional considerations when you are setting up security to use an external security manager in a cluster environment and across mixed nodes. For instance, it is recommended that you perform any configuration for an external security manager after you have completed all other setup tasks, including ensuring that the cluster is functional.
After you complete the following authorization procedure, the Tivoli Access Manager protected object space contains entries for portal roles in the following format:portal_server_root/role_name/application_name/server_name/cell_nameFor example: portal_server_root/Administrator@VIRTUAL_EXTERNAL_ACCESS_CONTROL/app/server/cell
Perform the following steps to configure Tivoli Access Manager to perform authorization:
Input | Description |
---|---|
PDAdminId | The user ID for the administrative Tivoli Access Manager user. |
PDAdminPw | The password for the administrative Tivoli Access Manager user. |
PDPermPath | The location of the Tivoli Access Manager AMJRTE properties file. |
where profile_root is the name of the WebSphere Application Server profile where WebSphere Portal Express is installed; for example, wp_profile.
Input | Description |
---|---|
EACserverName | (Optional) Namespace context information to further distinguish externalized portal role names from other roll names in the Tivoli Access Manager namespace. Note: If set, EACcellName and EACappname must also be set. |
EACcellName | (Optional) Namespace context information to further distinguish externalized portal role names from other roll names in the Tivoli Access Manager namespace. Note: If set, EACserverName and EACappname must also be set. |
EACappName | (Optional) Namespace context information to further distinguish externalized portal role names from other roll names in the Tivoli Access Manager namespace. Note: If set, EACcellName and EACservername must also be set. |
reorderRoles | (Optional) This field will allow you to either have your externalized Portal rolenames displayed with the resource type first, or the role types first. |
PDAdminId | The user ID for the administrative Tivoli Access Manager user. |
PDAdminPw | The password for the administrative Tivoli Access Manager user. |
PDPermPath | The location of the Tivoli Access Manager AMJRTE properties file. |
PDRoot | Root objectspace entry in the Tivoli Access Manager namespace. All Portal roles will be installed under this objectspace entry. If you will be using Tivoli Access Manager for multiple portal instances, choose a unique name for each root objectspace entry to easily distinguish one entry from another portal instance entry. |
PDAction | When the Tivoli Access Manager external authorization plugin is started, it will detect and, if necessary, create a custom action in Tivoli Access Manager. The combination of the action group and the action determines the Tivoli Access Manager permission string required to assign membership to externalized Portal roles. |
PDActionGroup | When the Tivoli Access Manager external authorization plugin is started, it will detect and, if necessary, create a custom action group in Tivoli Access Manager. The combination of the action group and the action determines the Tivoli Access Manager permission string required to assign membership to externalized Portal roles. Note: Tivoli Access Manager accommodates a maximum of 30 custom action groups. |
PDCreateAcl | When Portal externalizes a role, it can automatically create and attach a Tivoli Access Manager ACL granting membership to the user doing the role. If you set this property to false, the Tivoli Access Manager administrator will be responsible for creating Tivoli Access Manager ACLs to allow access to Portal roles. |
where profile_root is the name of the WebSphere Application Server profile where WebSphere Portal Express is installed; for example, wp_profile.
You can change this format to Resource Type/Name/Object ID@Role type. This format change groups the roles by resource name instead of by role type. For example, PORTLET_APPLICATION/Welcome/1_0_1G@Administrator. This format change is visible only when the roles are externalized. This change does not affect the way roles are displayed in WebSphere Portal Express.
The Administrator@VIRTUAL/wps.EXTERNAL ACCESS CONTROL/1 role is never affected by this format change. This role always appears with the role type Administrator on the left.
Follow these steps to change the format for externalized roles:Administrator@WEB_MODULE/Tracing.war/1_0_3K Administrator@PORTLET_APPLICATION/Welcome/1_0_1G User@WEB_MODULE/Tracing.war/1_0_3K Privileged User@WEB_MODULE/Tracing.war/1_0_3K Privileged User@PORTLET_APPLICATION/Welcome/1_0_1GExample of roles list with reorderRoleNames=true
PORTLET_APPLICATION/Welcome/1_0_1G@Administrator PORTLET_APPLICATION/Welcome/1_0_1G@Privileged User WEB_MODULE/Tracing.war/1_0_3K@Administrator WEB_MODULE/Tracing.war/1_0_3K@Privileged User WEB_MODULE/Tracing.war/1_0_3K@User
pdadmin> acl show WPS_Administrator-VIRTUAL_wps-EXTERNAL_ACCESS_CONTROL_1
pdadmin> acl modify WPS_Administrator-VIRTUAL_wps-EXTERNAL_ACCESS_CONTROL_1 set user wpsadmin T[WPS]m pdadmin> acl modify WPS_Administrator-VIRTUAL_wps-EXTERNAL_ACCESS_CONTROL_1 set group wpsadmins T[WPS]m
where wpsadmin is the portal administrator user ID and wpsadmins is the portal administrator group.