Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - NSAPI PROGRAMMER GUIDE Guida Utente

Navigare online o scaricare Guida Utente per Server Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - NSAPI PROGRAMMER GUIDE. Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - NSAPI PROGRAMMER GUIDE User guide Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa

Sommario

Pagina 1

Interstage Application Server V7.0 Single Sign-on Operator's Guide

Pagina 2 - Trademarks

Single Sign-on Operator's Guide: Table of Contents x Appendix A Samples of User Program Descriptions Registering a Role Configuration in the S

Pagina 3 - Preface

Chapter 2: Environment Setup (SSO Administrators) 2-24 <!-- (Arbitrary: Multiple values allowed: Same value not allowed) --> <

Pagina 4

Repository Server Setup 2-25 Example For the administrator DN and Bind password, specify the administrator DN and administrator DN password that we

Pagina 5 - Table of Contents

Chapter 2: Environment Setup (SSO Administrators) 2-26 UX:IREP: INFO: irep13570: adding new entry cn=Admin,ou=Role,ou=SSO ACI,ou=interstage,o=fuji

Pagina 6

Repository Server Setup 2-27 cn=User005,ou=User,ou=interstage,o=fujitsu,dc=com IREP: INFO: irep13570: adding new entry cn=User006,ou=User,ou=inters

Pagina 7

Chapter 2: Environment Setup (SSO Administrators) 2-28 Using an LDIF File This section explains how to register user information and role configura

Pagina 8

Repository Server Setup 2-29 objectClass: organizationalUnit objectClass: top ou: Role dn: ou=Resource,ou=SSO ACI,ou=interstage,o=fujitsu,dc=com ob

Pagina 9

Chapter 2: Environment Setup (SSO Administrators) 2-30 objectClass: top <- Mandatory object class cn: Leader

Pagina 10

Repository Server Setup 2-31 # User definition # #****************************************************** # Entry: User: user001 dn: cn=user001,ou=Us

Pagina 11 - Overview

Chapter 2: Environment Setup (SSO Administrators) 2-32 ssoRoleName: Admin <- Role name ssoAuthType: basicAuthOrCertAuth

Pagina 12 - What Is Single Sign-on

Repository Server Setup 2-33 objectClass: inetOrgPerson <- Mandatory object class objectClass: ssoUser <- Mandator

Pagina 13

1-1 Chapter 1 Overview This chapter provides an outline and description of the functions in the Interstage Single Sign-on application.

Pagina 14 - Effects of Single Sign-on

Chapter 2: Environment Setup (SSO Administrators) 2-34 cn: user005 <- First and last name # Entry: User: user006 dn: cn=

Pagina 15 - Implementation Method

Repository Server Setup 2-35 Example For the administrator DN and Bind password, specify the administrator DN and administrator DN password that we

Pagina 16 - Basic System Configuration

Chapter 2: Environment Setup (SSO Administrators) 2-36 For the administrator DN and Bind password, specify the administrator DN and administrato

Pagina 17

Repository Server Setup 2-37 Note Ensure that you take sufficient action to protect the administrator password. For details about securing your data

Pagina 18

Chapter 2: Environment Setup (SSO Administrators) 2-38 Example of Specification Admin Notes • Specify this attribute only once. • Use only alphan

Pagina 19

Repository Server Setup 2-39 Attributes Specify the name of a role set and role to be included in the role set as the attributes of the above object

Pagina 20

Chapter 2: Environment Setup (SSO Administrators) 2-40 The following characters are valid: • Alphanumeric characters • Space ( ), exclamation mark

Pagina 21 - Business System

Repository Server Setup 2-41 Example of Role Set Whose Configuration Includes a Loop (Looped Portion is Assumed to be Invalid) Figure 2-8 A Role S

Pagina 22

Chapter 2: Environment Setup (SSO Administrators) 2-42 • Attributes that must be set for executing certificate authentication (Note) − mail − empl

Pagina 23

Repository Server Setup 2-43 Table 2-7 Attributes Used by Interstage Single Sign-on User information object class Attribute name Explanation cn N

Pagina 24 - Administrators

Chapter 1: Overview 1-2 What Is Single Sign-on A business information system uses multiple Web Servers and Web Services together. Users usually need

Pagina 25 - Authentication

Chapter 2: Environment Setup (SSO Administrators) 2-44 (1) cn Description Specify the first and last name to identify the user entry. Always specif

Pagina 26 - User ID/password

Repository Server Setup 2-45 The following characters are valid: • Alphanumeric characters • Space ( ), exclamation mark (!), question mark (?), at

Pagina 27

Chapter 2: Environment Setup (SSO Administrators) 2-46 (5) employeeNumber Description Specify the number allocated for each user, e.g., employee nu

Pagina 28

Repository Server Setup 2-47 The following characters are valid: • Alphanumeric characters • Space ( ), single quotation mark ('), left parent

Pagina 29

Chapter 2: Environment Setup (SSO Administrators) 2-48 − basicAuthAndCertAuth: Password authentication and certificate authentication − basicAuth

Pagina 30

Repository Server Setup 2-49 Note [Release user lock] of the Interstage Management Console is used to unlock the user account. Do not directly set o

Pagina 31

Chapter 2: Environment Setup (SSO Administrators) 2-50 (13) ssoNotAfter Description Specify the date after which Single Sign-on is not available to

Pagina 32

Repository Server Setup 2-51 (15) ssoLockTimeStamp Description This attribute specifies the date when the user was locked by the repository server i

Pagina 33

Chapter 2: Environment Setup (SSO Administrators) 2-52 7. Activate the created repository server. Refer to 'Starting a Repository Server&apo

Pagina 34

Repository Server Setup 2-53 1. Setting SSL Communication 1. Preparations for SSL communication (acquiring the SSL site certificate and registerin

Pagina 35 - Authentication Information

What Is Single Sign-on 1-3 Figure 1-1 Problems in Conventional Systems Reduced User Convenience Since each system has an authentication function, a

Pagina 36

Chapter 2: Environment Setup (SSO Administrators) 2-54 Adding a Repository Server (Reference System) This section explains how to set up a reposito

Pagina 37

Repository Server Setup 2-55 After execution of the irepbacksys command, the backup folder is created under the C:\WINDOWS\temp folder. C:\>i

Pagina 38

Chapter 2: Environment Setup (SSO Administrators) 2-56 − Protocol Version Select 'SSL 3.0' only. − Client Certificate Select 'Yes (A

Pagina 39

Repository Server Setup 2-57 General Settings − Repository Name (*1) Enter the same name as that of the SSO repository (master) that was created fo

Pagina 40

Chapter 2: Environment Setup (SSO Administrators) 2-58 − Retrieval Processing Timeout The default value is '3600' seconds. Change this v

Pagina 41

Repository Server Setup 2-59 The SSO master repository data of the update system repository server is restored according to the following procedure:

Pagina 42

Chapter 2: Environment Setup (SSO Administrators) 2-60 Backup file name: /home/user1/backup.tar.Z SSO repository name: ssorep Database storage dir

Pagina 43

Repository Server Setup 2-61 Changing the Settings of the SSO Repository of the Restored Repository Server (Reference System) Set replication slave

Pagina 44

Chapter 2: Environment Setup (SSO Administrators) 2-62 Notes • When the Microsoft® Internet Explorer is used as the browser, an authentication inf

Pagina 45 - Authorization

Setup of Authentication Server 2-63 Setup of Authentication Server This section explains the procedure for setting up of the authentication server t

Pagina 46

Chapter 1: Overview 1-4 Low Level of Security The total security level of an information system that contains multiple subsystems is equivalent to th

Pagina 47

Chapter 2: Environment Setup (SSO Administrators) 2-64 SSL Communication using Application Gateway For operation using non-SSL communication betwee

Pagina 48 - Post/department Role name

Setup of Authentication Server 2-65 Refer to 'SSL Commands' in Reference Manual (Command Edition) for details of the scsmakeenv command fo

Pagina 49

Chapter 2: Environment Setup (SSO Administrators) 2-66 The following is an example in which the Interstage certificate environment with the access

Pagina 50

Setup of Authentication Server 2-67 When the scsmakeenv command is terminated normally, the CSR is output to the file specified with the -f option o

Pagina 51

Chapter 2: Environment Setup (SSO Administrators) 2-68 Is <CN=authenticate_server.fujitsu.com, OU=FUJITSU TOKYO, O=FUJITSU, L=Shinjuku, ST=Toky

Pagina 52

Setup of Authentication Server 2-69 CA certificate: '/tmp/ca-cert.cer' CA Certificate Nickname: 'CACERT' Site certificate: &a

Pagina 53

Chapter 2: Environment Setup (SSO Administrators) 2-70 Protocol Version Select 'SSL 2.0' and 'SSL 3.0'. Verify Client Certifica

Pagina 54

Setup of Authentication Server 2-71 Example The following shows an example in which the Interstage certificate environment is created for the first

Pagina 55

Chapter 2: Environment Setup (SSO Administrators) 2-72 New Password: Retype: UX:SCS: INFO: scs0100: Interstage certificate environment was created

Pagina 56

Setup of Authentication Server 2-73 # JAVA_HOME=/opt/FJSVawjbk/jdk14;export JAVA_HOME # scsenter –n CRLCACERT –f /tmp/crlca-cert.cer Password: Ce

Pagina 57 - Linkage with SSL Accelerator

What Is Single Sign-on 1-5 Figure 1-2 Comparison of a Conventional System and an Interstage Single Sign-on system Implementation Method Interstage S

Pagina 58

Chapter 2: Environment Setup (SSO Administrators) 2-74 The following example uses the Bourne shell. When password input is requested, enter the pas

Pagina 59

Setup of Authentication Server 2-75 6. To distribute load by setting multiple repository servers, specify [Host name and Port number of Repository

Pagina 60

Chapter 2: Environment Setup (SSO Administrators) 2-76 Adding an Authentication Server for Load Distribution This section explains the process of a

Pagina 61

Setup of Authentication Server 2-77 Setting Up Environment for Destination Machine for Copying 1. For SSL communication using the authentication se

Pagina 62

Chapter 2: Environment Setup (SSO Administrators) 2-78 • The environment information file of the authentication server is important for security.

Pagina 63

Setting up a Repository Server and Authentication Server on a Single Machine 2-79 Setting up a Repository Server and Authentication Server on a Sing

Pagina 64

Chapter 2: Environment Setup (SSO Administrators) 2-80 Registering a Business System If a business server administrator requests an SSO administrat

Pagina 65

Registering a Business System 2-81 Information to be Acquired from Business Server Administrator When a business server administrator requests you t

Pagina 66

Chapter 2: Environment Setup (SSO Administrators) 2-82 Remarks When this system is linked with the Application Gateway and can be accessed only by

Pagina 67 - Choosing URLs

Registering a Business System 2-83 The file name and file path of the authentication server configuration file Configuration file name: ssoatcag.con

Pagina 68

Chapter 1: Overview 1-6 Basic System Configuration The Interstage Single Sign-on system basically consists of an authentication infrastructure, a bus

Pagina 69

Chapter 2: Environment Setup (SSO Administrators) 2-84 Item Configuration Name Setting Contents Omissible or Required [Host Name]: Set the host na

Pagina 70

Registering a Business System 2-85 Item Configuration Name Setting Contents Omissible or Required Specifying the protection path "/protect/&qu

Pagina 71 - Business system public URL

Chapter 2: Environment Setup (SSO Administrators) 2-86 Item Configuration Name Setting Contents Omissible or Required If the value set for the pro

Pagina 72

Registering a Business System 2-87 Addition, modification or deletion of protection resource information If adding, modifying or deleting protection

Pagina 73

Chapter 2: Environment Setup (SSO Administrators) 2-88 • The business system setup file is important for security. Be sure to delete this file aft

Pagina 74

More Secure Use 2-89 More Secure Use Communication data and authentication information between servers are encrypted in the Interstage Single Sign-o

Pagina 75

Chapter 2: Environment Setup (SSO Administrators) 2-90 Figure 2-10 Interstage Single Sign-on Using IPsec 1. The IPsec encryption communication i

Pagina 76

More Secure Use 2-91 Using a Firewall When a firewall is set, a group of authentication servers and repository servers must be set up in an independ

Pagina 77 - Chapter 2

Chapter 2: Environment Setup (SSO Administrators) 2-92 For an explanation of installing the firewall and setting filtering function, refer to the m

Pagina 78

3-1 Chapter 3 Environment Setup (Business Server Administrators) This chapter explains the flow of, and method for, setting up the business system e

Pagina 79

Basic System Configuration 1-7 If the user accesses the business system without being authenticated, the Web browser is automatically directed to the

Pagina 80

Chapter 3: Environment Setup (Business Server Administrators) 3-2 Environment Setup Flow This section explains how to add a business system. Refer t

Pagina 81

Environment Setup Flow 3-3 For details regarding the set up of Web system and Web service environments, refer to the Web server manual. The configura

Pagina 82 - Spreadsheet

Chapter 3: Environment Setup (Business Server Administrators) 3-4 System configuration Setting up a business server on a server Setting up business s

Pagina 83

Environment Setup Flow 3-5 Conditions for Using the Business System Configuration Spreadsheet The business system configuration spreadsheet supports M

Pagina 84 - Designing an SSO Repository

Chapter 3: Environment Setup (Business Server Administrators) 3-6 Designing a Business System The business system administrator must clarify and repo

Pagina 85

Setting up Business Servers 3-7 Setting up Business Servers This section explains the procedure for setting up business servers. The Interstage Manag

Pagina 86 - User information Item

Chapter 3: Environment Setup (Business Server Administrators) 3-8 - Microsoft(R) Internet Information Service • If multiple types of Web servers a

Pagina 87

Setting up Business Servers 3-9 8. To use linkage with Interstage Portalworks, select [System] > [Security] > [Single Sign-on] > [Business s

Pagina 88 - Repository Server Setup

Chapter 3: Environment Setup (Business Server Administrators) 3-10 4. To update access control information automatically when the business server is

Pagina 89 - Creating an SSO Repository

Setting up Business Servers 3-11 The following procedure describes how to use the ssocloneaz command to migrate the environment of the existing busine

Pagina 90 - Tree to be created Use

Chapter 1: Overview 1-8 Note The repository server is provided by the following products: • Interstage Application Server Enterprise Edition • Inte

Pagina 91

Chapter 3: Environment Setup (Business Server Administrators) 3-12 • Configure the following settings when the load balancer is Interstage Traffic D

Pagina 92

Setting up Business Servers 3-13 /etc/opt/FSUNprovd(*1) *1 The configuration file name can be changed. Table 3-2 Environment configuration file for

Pagina 93

Chapter 3: Environment Setup (Business Server Administrators) 3-14 Environment Configuration File Name and Storage Destination Environment configurat

Pagina 94

Setting up Business Servers 3-15 For details about the environment configuration file for Sun ONE Web Server, refer to “NSAPI Programmer’s Guide for

Pagina 95 - Using a CSV Data File

Chapter 3: Environment Setup (Business Server Administrators) 3-16 Example Init fn="load-modules" shlib="/usr/lib/ssoatzipl.so"

Pagina 96 - Row Item

Setting up Business Servers 3-17 Example Examples of magnus.conf and obj.conf that have been set immediately after installation of Sun ONE Web Server

Pagina 97

Chapter 3: Environment Setup (Business Server Administrators) 3-18 Microsoft(R) Internet Information Services 5.0 and 6.0 This section explains the p

Pagina 98

Setting up Business Servers 3-19 2. If Microsoft(R) Internet Information Services is running, stop it. To stop Microsoft(R) Internet Information Serv

Pagina 99

Chapter 3: Environment Setup (Business Server Administrators) 3-20 3. Select the Web site into which a business server is to be integrated. In the f

Pagina 100

Setting up Business Servers 3-21 4. Select Properties to open the property sheet. Select the [ISAPI Filters] tab, and then click the Add button. Fi

Pagina 101

Basic System Configuration 1-9 2. When Setting Up the Authentication Server on Multiple Machines and the Repository Server on a Machine (Middle-scale

Pagina 102

Chapter 3: Environment Setup (Business Server Administrators) 3-22 Figure 3-7 Specify Business Server 6. After the settings have been made, click

Pagina 103

Setting up Business Servers 3-23 Setting the Access Permission for Operation Resources of a Web Server Used by a Business Server The Web server used b

Pagina 104 - Using an LDIF File

Chapter 3: Environment Setup (Business Server Administrators) 3-24 Permit only the owner and group to access the access log output destination direc

Pagina 105

4-1 Chapter 4 Operation and Maintenance This chapter explains the operation and maintenance of Interstage Single Sign-on, including starting and sto

Pagina 106

Chapter 4: Operation and Maintenance 4-2 Starting Single Sign-on This section explains how to start the servers. • Starting a Repository Server • S

Pagina 107

Starting Single Sign-on 4-3 Starting an Authentication Server To start an authentication server, use the Interstage Management Console on the server w

Pagina 108

Chapter 4: Operation and Maintenance 4-4 • If Microsoft Internet Information Services 6.0 is used To start a business server, start Microsoft Intern

Pagina 109

Stopping Single Sign-on 4-5 Stopping Single Sign-on This section explains how to stop the servers. • Stopping a Business Server • Stopping an Authen

Pagina 110

Chapter 4: Operation and Maintenance 4-6 • If InfoProvider Pro is used Stopping InfoProvider Pro automatically stops a business server. To stop In

Pagina 111

Changing Environment Settings 4-7 Changing Environment Settings This section explains how to change the operating environments of the repository serve

Pagina 112

Single Sign-on Operator's Guide - Preface ii Trademarks Trademarks of other companies are used in this user guide only to identify particular pro

Pagina 113 - Role Configuration Entry

Chapter 1: Overview 1-10 Figure 1-7 Setting Up the Repository Server and Authentication Server on Multiple Machines Individually (Large Scale Syst

Pagina 114 - Object class Description

Chapter 4: Operation and Maintenance 4-8 − Protection resource registration entry For details on creating the repository server (reference system),

Pagina 115

Changing Environment Settings 4-9 [Actions for Changing Effective User] • If Interstage HTTP Server is used After the effective user of the Web serve

Pagina 116

Chapter 4: Operation and Maintenance 4-10 User Related Operation This section explains how to manage user-related operations. Single Sign-on users a

Pagina 117 - User Information Entry

User Related Operation 4-11 Amending the Role of a User If the section or title of a user changes, the accessible resources can be amended by changing

Pagina 118

Chapter 4: Operation and Maintenance 4-12 Notes • When resetting a password, pay careful attention to password security. For details on password sec

Pagina 119

Authorization-related Operation 4-13 Authorization-related Operation This section explains changing role configurations and protection resources. • A

Pagina 120

Chapter 4: Operation and Maintenance 4-14 Notes • If the repository server (update system) and repository server (reference system) are allocated fo

Pagina 121

Authorization-related Operation 4-15 Notes • If the repository server (update system) and repository server (reference system) are allocated for load

Pagina 122

Chapter 4: Operation and Maintenance 4-16 Maintenance Using Access Logs Interstage Single Sign-on records authentication and authorization processing

Pagina 123

Maintenance Using Access Logs 4-17 User Identification Information User identification information (dn or uid) identifies the user who has requested a

Pagina 124

Basic System Configuration 1-11 Business System The business system provides users with Web-based services. The business system basically consists of

Pagina 125

Chapter 4: Operation and Maintenance 4-18 Supplementary Information The cause of authentication failure is recorded in the access log. For details ab

Pagina 126

Maintenance Using Access Logs 4-19 Date/Time Access date/time is recorded in the “YYYY/MM/DD HH:MM:SS+XXXX” format. "+XXXX" refers to the ti

Pagina 127

Chapter 4: Operation and Maintenance 4-20 Example 10.131.201.199 – 10.131.201.34 – 10.131.201.88 [2002/09/11 20:28:22 +0900] – "cn=User001,

Pagina 128

Maintenance Using Access Logs 4-21 Example 10.131.201.199 [2002/09/11 20:28:22 +0900] – "cn=User001,ou=User,ou=interstage,o=fujitsu,dc=com&qu

Pagina 129

Chapter 4: Operation and Maintenance 4-22 Operating Notes for Large Systems For operation using large systems, note the following points: • To updat

Pagina 130

5-1 Chapter 5 Single Sign-on Customization This chapter explains Interstage Single Sign-on Customization and includes the following sections: • Cus

Pagina 131 - System)

Chapter 5: Single Sign-on Customization 5-2 Customizing Messages Displayed on a Web Browser Interstage Single Sign-on provides a function that custom

Pagina 132

Customizing Messages Displayed on a Web Browser 5-3 If an authentication server has already been added for load balancing, also customize the messages

Pagina 133

Chapter 5: Single Sign-on Customization 5-4 Cause of the message to be displayed Message Contents Message File Name The specified certificate is dam

Pagina 134

Customizing Messages Displayed on a Web Browser 5-5 Notes • Message files are available in Japanese and English versions. Select the appropriate mes

Pagina 135

Chapter 1: Overview 1-12 Figure 1-9 Setting Up a Business Server on a Machine 2. When Setting Up Business Servers on Multiple Machines This system

Pagina 136

Chapter 5: Single Sign-on Customization 5-6 Cause of Error Message Contents Message File Name The user was locked out because the password was re-e

Pagina 137 - (Reference System)

Customizing Messages Displayed on a Web Browser 5-7 • If [No] is specified for [Notify Cause of Authentication Failure to user?] when the authenticat

Pagina 138

Chapter 5: Single Sign-on Customization 5-8 Cause of Error Message Contents Message File Name The system does not support generation of an 8.3-for

Pagina 139

Customizing Messages Displayed on a Web Browser 5-9 Example An example of editing message file “403roleerr_en.template” is shown below. Unedited Messa

Pagina 140

Chapter 5: Single Sign-on Customization 5-10 - Ask the System Administrator to check whether the required access authority has been assigned<BR>

Pagina 141

Customizing Messages Displayed on a Web Browser 5-11 • If a message file is deleted or there is no authority to access a message file, the system log

Pagina 142

Chapter 5: Single Sign-on Customization 5-12 Access Authorization for the Message File Output at Form Authentication Table 5-4 Windows Access Author

Pagina 143

Customizing Messages Displayed on a Web Browser 5-13 Table 5-8 [Microsoft Internet Information Services 6.0] Resource Setting Authority to Access Co

Pagina 144

Chapter 5: Single Sign-on Customization 5-14 − To use InfoProvider Pro and other Web servers, set the effective user to other Web servers. − Set th

Pagina 145

Customizing Messages Displayed on a Web Browser 5-15 Form definition <form action="/ssoatcag" method="post"> • Set &

Pagina 146

Basic System Configuration 1-13 Client With Interstage Single Sign-on, a user uses the business system from a Web browser on a client. Supported Web B

Pagina 147

Chapter 5: Single Sign-on Customization 5-16 Service Linkage with SSO Repository Before the repository server of the Interstage Single Sign-on is st

Pagina 148

Service Linkage with SSO Repository 5-17 Canceling the Service Dependency Use the ssounsetsvc command to cancel the service dependency. For details on

Pagina 149

Chapter 5: Single Sign-on Customization 5-18

Pagina 150

6-1 Chapter 6 Troubleshooting This chapter explains the action to be taken if an error occurs during operation of the Interstage Single Sign-on syst

Pagina 151

Chapter 6: Troubleshooting 6-2 Error Handling This section explains how to respond to abnormalities that may occur during operation. Error Investigat

Pagina 152

Error Handling 6-3 SSO Administrator The SSO administrator must perform the following steps as necessary: • Change the SSO repository settings • In

Pagina 153

Chapter 6: Troubleshooting 6-4 /var/adm/messages /var/log/messages • Output destination of access log of business server The access log is output

Pagina 154

Examples of Errors 6-5 Examples of Errors Errors are generally classified into the following items: • Errors that can be encountered while using the

Pagina 155 - Server on a Single Machine

Chapter 6: Troubleshooting 6-6 Although a business system protected resource is accessed, no response is returned. Confirm the following: • The bus

Pagina 156

Examples of Errors 6-7 *4 Refer to “Linkage with SSL Accelerator” for details of the SSL accelerator settings. Refer to “Load Balancing” for details

Pagina 157

Chapter 1: Overview 1-14 Administrators To operate Interstage Single Sign-on, the SSO (Single Sign-on) administrator must not only manage the authent

Pagina 158 - Registering Protection Path

Chapter 6: Troubleshooting 6-8 Message "ihs81215: The error occurred in start processing of Interstage HTTP Server. " is displayed on the I

Pagina 159 - Required

7-1 Chapter 7 Developing Applications Interstage SSO (single sign-on) supports authentication to Interstage single sign-on authentication servers an

Pagina 160

Chapter 7: Developing Applications 7-2 Developing Java Applications This section explains how to develop Java applications using the Java application

Pagina 161

Developing Java Applications 7-3 Program Development Flow Servlet Application that Receives Authentication Information from a Client Figure 7-1 Servl

Pagina 162

Chapter 7: Developing Applications 7-4 Processing Flow Table 7-2 provides processing flow information. Table 7-2 Process Flow Information Processing

Pagina 163

Developing Java Applications 7-5 Setup Item Required? Explanation protection resources Executing application Required Set the JavaVM options. Obta

Pagina 164

Chapter 7: Developing Applications 7-6 When an Application Runs as a Stand-alone Application When an application is run as a stand-alone application

Pagina 165 - More Secure Use

Developing Java Applications 7-7 Setup Items Required? Explanation Creating login configuration file Required Create a login configuration file corr

Pagina 166

Chapter 7: Developing Applications 7-8 Example import java.io.BufferedReader; import java.io.InputStreamReader; import java.io.IOException; import

Pagina 167 - Using a Firewall

Developing Java Applications 7-9 continue; } finally { Arrays.fill(password,' '); Arrays.fill(tmp,'

Pagina 168

Authentication 1-15 Authentication Authentication is the operation used to check the validity of any person who attempts to use the system. This secti

Pagina 169 - Administrators)

Chapter 7: Developing Applications 7-10 public static void main(String args[]) { ISSsoJaas sample = new ISSsoJaas(); try{ if (sample

Pagina 170 - Environment Setup Flow

Developing Java Applications 7-11 Converting LoginContext to an Instance Convert the LoginContext to an instance. The code is shown below. LoginCo

Pagina 171

Chapter 7: Developing Applications 7-12 Obtaining User Information When JAAS authentication is executed successfully, the objects listed below are as

Pagina 172

Developing Java Applications 7-13 Table 7-7 Object Classes Associated with the Subject Object Class Name Explanation com.fujitsu.interstage.sso.auth.

Pagina 173

Chapter 7: Developing Applications 7-14 • Client IP address • Authentication time • Re-authentication time • Scope of authentication information. O

Pagina 174 - Designing a Business System

Developing Java Applications 7-15 } try{ System.out.println("user.home=" + System.getProperty("user.home")); }ca

Pagina 175 - Setting up Business Servers

Chapter 7: Developing Applications 7-16 Setting the Application Execution Environment This section explains how the administrator for the operating a

Pagina 176

Developing Java Applications 7-17 Table 7-9 Setting Environment Variables for Solaris OE and Linux (JDK1.3) Environment Variable Values CLASSPATH

Pagina 177

Chapter 7: Developing Applications 7-18 Example Interstage install directory: C:\Interstage JDK install directory: "C:\Interstage\JDK14"

Pagina 178 - Load Balancing

Developing Java Applications 7-19 Obtaining Service ID File If an authentication server of the authentication destination is specified with a Java app

Pagina 179

Chapter 1: Overview 1-16 Also, a re-authentication interval can be specified for authentication. When a re-authentication interval is specified, an

Pagina 180

Chapter 7: Developing Applications 7-20 • Java application that receives a user ID/password from a client for authentication com.fujitsu.interstage.

Pagina 181 - Item name Contents

Developing Java Applications 7-21 Option Explanation authservertrusted Specify whether the site certificate of an authentication server presented fro

Pagina 182

Chapter 7: Developing Applications 7-22 Execution of a Java Application that Receives a User ID/Password from a Client for Authentication Business s

Pagina 183

Developing Java Applications 7-23 To Grant Permission for Each Code Base grant codeBase <URL>{ permission <access-permission-class-name&g

Pagina 184

Chapter 7: Developing Applications 7-24 File Encoding for Security Policy File When a character other than alphanumeric characters and symbols is use

Pagina 185

Developing Java Applications 7-25 Table 7-14 Jar File Descriptions Jar File Explanation Jar file used by the single sign-on JavaAPI (*1) Specify perm

Pagina 186

Chapter 7: Developing Applications 7-26 "com.fujitsu.interstage.sso.auth.ISAuthorizationCredential com.fujitsu.interstage.sso.auth.ISUserP

Pagina 187

Developing Java Applications 7-27 permission javax.security.auth.AuthPermission "createLoginContext.com.fujitsu.interstage.sso"; per

Pagina 188

Chapter 7: Developing Applications 7-28 /etc/opt/FJSVisscs/security/env/keystore/.keystore Using the Keytool Command Obtain the site certificate

Pagina 189

Developing Java Applications 7-29 Setting Access Permission for Operation Resources Resources (such as the configuration file and service ID file) are

Pagina 190

Authentication 1-17 If the form authentication is used, users can access the Authentication infrastructure URL directly through a Web browser for auth

Pagina 191

Chapter 7: Developing Applications 7-30 Table 7-15 Setting Access Permissions for Files (Windows) Resource Explanation Service ID file Set access pe

Pagina 192

Developing Java Applications 7-31 Registering Protection Resources For a servlet application that receives authentication information from a client, t

Pagina 193 - Operation and Maintenance

Chapter 7: Developing Applications 7-32 An OutOfMemoryError error typically occurs in this situation. The memory used in Java can be broadly divided

Pagina 194 - Starting Single Sign-on

Developing Java Applications 7-33 Objects in an Old generation area that are no longer required are recovered using FullGC processing. The total memor

Pagina 195 - Starting a Business Server

Chapter 7: Developing Applications 7-34 Executing Applications This section explains how to execute a Java application that uses the single sign-on J

Pagina 196

Developing Java Applications 7-35 If the Java application to be executed uses a trust store file other than the JDK or JSSE default, a system property

Pagina 197 - Stopping Single Sign-on

Chapter 7: Developing Applications 7-36 /opt/FJSVj2ee/lib The copy destination directories are shown below. C:\Interstage\J2EE\var\deployment\ijs

Pagina 198 - Stopping a Repository Server

Developing Java Applications 7-37 JDK1.4 java -Djava.security.auth.login.config=login-configuration-file-absolute-pathname -Djava.security.manager

Pagina 199

Chapter 7: Developing Applications 7-38 /opt/FJSVj2ee/var/deployment/ijserver/IJServer name/ext For details on servlet application operation, refe

Pagina 200

Developing Java Applications 7-39 Sample Code Storage Location Sample codes are stored in the following directories (hereafter referred to as sample d

Pagina 201 - Management Console

Chapter 1: Overview 1-18 Figure 1-13 Form Authentication Page in Microsoft(R) Internet Explorer 6.0 Example Basic authentication dialog for Microso

Pagina 202 - User Related Operation

Chapter 7: Developing Applications 7-40 (2) Deploying Servlet Application Use the Interstage Management Console to deploy the servlet application in

Pagina 203 - Canceling Lockout

Developing Java Applications 7-41 (3) Setting IJServer WorkUnit Use the Interstage Management Console to select the [System] > [WorkUnit] > [IJ

Pagina 204 - Checking User Lock Status

Chapter 7: Developing Applications 7-42 JavaVM option -Djava.security.auth.login.config=C:\Interstage\J2EE\var\deployment\ijserver \IJServer\webap

Pagina 205 - Amending Role Configurations

Developing Java Applications 7-43 /** * sample login config file */ com.fujitsu.interstage.sso{ com.fujitsu.interstage.sso.auth.module.ISCrede

Pagina 206 - Amending Protection Resource

Chapter 7: Developing Applications 7-44 Note Use JDK1.4 if the UTF-8 type is used for the site certificate or CA certificate. (7) Defining Servlet A

Pagina 207

Developing Java Applications 7-45 Use the Interstage Management Console to select [System] > [Security] > [Single Sign-on] > [Business system

Pagina 208

Chapter 7: Developing Applications 7-46 Example AuthorizationCredential ・・・ Dn cn=user002,ou=User,ou=interstage,o=fujitsu,dc=c

Pagina 209

Developing Java Applications 7-47 Execution Procedure (1) Preparation Perform the following steps: 1. Obtain the authentication infrastructure URL t

Pagina 210

Chapter 7: Developing Applications 7-48 C:\>set CLASSPATH=C:\Interstage\F3FMsso\ssoatzag\lib\isssomod14.jar C:\>set JAVA_HOME=C:\Interstage\

Pagina 211

Developing Java Applications 7-49 (4) Obtaining Service ID File Request that the SSO administrator creates a service ID file for the business server

Pagina 212

Authentication 1-19 Figure 1-14 Authentication Window for Microsoft ® Internet Explorer 6.0 Example Basic authentication dialog for Netscape Communi

Pagina 213

Chapter 7: Developing Applications 7-50 com.fujitsu.interstage.sso{ com.fujitsu.interstage.sso.auth.module.ISLoginModule Required authserver="

Pagina 214

Developing Java Applications 7-51 Change the role name in the sample file. permission java.util.PropertyPermission "user.home","rea

Pagina 215 - Single Sign-on Customization

Chapter 7: Developing Applications 7-52 (8) Activating Sample Application Activation examples are shown below. Example JDK1.3 Trust store file name

Pagina 216

Developing Java Applications 7-53 JDK1.4 Trust store file name: "C:\Interstage\etc\security\env\keystore\.keystore" C:\>cd C:\Interst

Pagina 217 - Cause of the message to be

Chapter 7: Developing Applications 7-54 psy6 zsl2A6d6FBzIsw7NeTkhBdjhq1Z506GaprHQ2zfqhWIzItto3x9dzSo2wQev/v4wn3Vc53lpWA/v Mqkj oMeVjQssloKIJfcF6gWBEH

Pagina 218

Developing Java Applications 7-55 When user “user001” does not belong to role “Admin” UserName=user001 Password=user001 *** Credential Information

Pagina 219

Chapter 7: Developing Applications 7-56 Setting User Information Report with Environment Variables Information on an authenticated user can be used i

Pagina 220

Setting User Information Report with Environment Variables 7-57 User Information Explanation Example Valid range for authentication information The

Pagina 221 - Authorization Error Messages

Chapter 7: Developing Applications 7-58 Notes • Information reported to a Web application must be within the size specified below. If it exceeds th

Pagina 222 - Customizing a Message

A-1 Appendix A Samples of User Program Descriptions This appendix provides examples of user programs developed with Java that are used to operate th

Pagina 223

Single Sign-on Operator's Guide - Preface iii Preface Purpose of this Document This manual describes the environment setup and operation procedur

Pagina 224

Chapter 1: Overview 1-20 Certificate Information For certificate authentication by Interstage Single Sign-on, the owner name (Subject), owner alias (

Pagina 225

Appendix A: Samples of User Program Descriptions A-2 DirContext ctx = new InitialDirContext(env); Note Carefully handle the administrator DN and

Pagina 226

Registering a Role Configuration in the SSO Repository A-3 Registering a Role Configuration in the SSO Repository This sample program assumes the envi

Pagina 227

Appendix A: Samples of User Program Descriptions A-4 Registering User Information in the SSO Repository This sample program assumes the environment s

Pagina 228

Registering User Information in the SSO Repository A-5 Description of User Program Example // Associating the values in CSV file with attributes pr

Pagina 229

Appendix A: Samples of User Program Descriptions A-6 al.add(index, null); } else { al.se

Pagina 230

Deleting User Information from the SSO Repository A-7 Deleting User Information from the SSO Repository This sample program assumes the environment se

Pagina 231

Appendix A: Samples of User Program Descriptions A-8 Adding a User Role This sample program assumes the environment setup below. Change the setup ac

Pagina 232

Adding a User Role A-9 for(int i = 0; i < roleAttr.size(); i++) { if(role.compareToIgnoreCase((String)roleAttr.get(i)

Pagina 233 - Troubleshooting

Appendix A: Samples of User Program Descriptions A-10 Deleting a User Role This sample program assumes the environment setup below. Change the setup

Pagina 234 - Error Handling

Deleting a User Role A-11 ModificationItem( DirContext.REPLACE_ATTRIBUTE, roleAttr ); ctx.modifyAttributes(dn, mods); }

Pagina 235 - Log output destination

Authentication 1-21 Figure 1-16 Certificate Selection Window for Microsoft ® Internet Explorer 6.0 Example Certificate selection window for Netscape

Pagina 236 - Settings] > [File name]

Appendix A: Samples of User Program Descriptions A-12 Displaying the User Lock Status This sample program assumes the environment setup below. Chang

Pagina 237 - Examples of Errors

Displaying the User Lock Status A-13 } } } : Postprocessing

Pagina 238

Appendix A: Samples of User Program Descriptions A-14 Displaying the User Validity Period This sample program assumes the environment setup below. C

Pagina 239

Displaying the User Validity Period A-15 } if(ret[0] != null) { System.out.println("Validity period start time = " + ret[0]); } el

Pagina 240

Appendix A: Samples of User Program Descriptions A-16 Changing the User Validity Period This sample program assumes the environment setup below. Cha

Pagina 241 - Developing Applications

Changing the User Password A-17 Changing the User Password This sample program assumes the environment setup below. Change the setup according to the

Pagina 242 - Developing Java Applications

Appendix A: Samples of User Program Descriptions A-18

Pagina 243 - Program Development Flow

B-1 Appendix B Entry Attributes To Be Registered in SSO Repository This appendix describes the user information, role configurations and protection

Pagina 244

Appendix B: Entry Attributes To Be Registered in SSO Repository B-2 User Information This section describes the user information managed by Interstag

Pagina 245

User Information B-3 Attribute name Explanation Description Example of registration ssoAuthType Authentication method Specifies the user authentica

Pagina 246

Chapter 1: Overview 1-22 Figure 1-17 Certificate Selection Window for Netscape Communicator 4.75 On Netscape Communicator, the following window is

Pagina 247 - Developing Programs

Appendix B: Entry Attributes To Be Registered in SSO Repository B-4 Attribute name Explanation Description Example of registration ssoNotBefore Va

Pagina 248

User Information B-5 Attribute name Explanation Description Example of registration ssoLockTimeStamp Lockout time Specifies the date and time the

Pagina 249

Appendix B: Entry Attributes To Be Registered in SSO Repository B-6 Role Configuration This section describes the role information required by Inters

Pagina 250

Role Configuration B-7 The role configuration can also be a role set that contains multiple roles. An example of role set configuration is shown belo

Pagina 251

Appendix B: Entry Attributes To Be Registered in SSO Repository B-8 Protection Resources This section describes the target domain information require

Pagina 252 - Obtaining User Information

Protection Resources B-9 Path Configuration This section describes the target path information required by Interstage Single Sign-on for access contro

Pagina 253 - Class Name Explanation

Appendix B: Entry Attributes To Be Registered in SSO Repository B-10

Pagina 254 - Executing Authorization

Index-1 Index access authority setting for message files, 5-11 access control information centralized management, 1-39 updating, 1-40 access logs auth

Pagina 255

Single Sign-on Operator’s Guide - Index Index-2 setting access permission for Web server operation resources, 3-23 setting up, 3-7 setting up for load

Pagina 256 - Environment Variable Values

Single Sign-on Operator’s Guide - Index Index-3 authentication, 1-15 authentication form tag specifications, 5-14 authentication infrastructure, 1-7 a

Pagina 257

Authentication 1-23 Checking the Effectiveness of Certificate The certificate used for certificate authentication can be checked effectiveness by the

Pagina 258

Single Sign-on Operator’s Guide - Index Index-4 lockout, 1-31 canceling, 4-11 messages customizing, 5-8 customizing authentication error messages, 5-5

Pagina 259 - Obtaining Service ID File

Single Sign-on Operator’s Guide - Index Index-5 changing settings of SSO repository for update system repository server, 2-62 confirming certificate a

Pagina 260 - Option Explanation

Single Sign-on Operator’s Guide - Index Index-6 Sun ONE Web Server Enterprise Edition 6.0 integrating into, 3-15 system availability, increased, 1-44

Pagina 261

Chapter 1: Overview 1-24 Password Authentication and Certificate Authentication This authentication method only assumes authentication has been succe

Pagina 262

Authentication 1-25 Item Description Role name/role set name Name of the role or role set assigned to the user. Multiple roles or role sets can be se

Pagina 263

Chapter 1: Overview 1-26 Certificate Selection Windows If no certificate (or only one certificate) has been registered in the client computer, the di

Pagina 264

Authentication 1-27 Figure 1-21 Security Settings Example Netscape Communicator 4.78 Select [Communicator] > [Tools] > [Security Info], and fr

Pagina 265 - Jar File Explanation

Chapter 1: Overview 1-28 Figure 1-22 Netscape Navigator Screen Restrictions on Authentication Interstage Single Sign-on provides some functions to

Pagina 266

Authentication 1-29 When the authenticated user connects to the business system from a client computer that has a different IP address, the user is re

Pagina 267 - Creating a Trust Store File

Single Sign-on Operator's Guide - Preface iv Organization of this Document This document is organized as follows: • Chapter 1 Overview This chap

Pagina 268

Chapter 1: Overview 1-30 For details of the user information stored in the SSO repository, refer to "User Information Entry". For details o

Pagina 269

Authentication 1-31 User Validity Period Validity periods can be set for users in Interstage Single Sign-on. For example, if the information on new em

Pagina 270 - Resource Explanation

Chapter 1: Overview 1-32 Figure 1-25 Lockout in Single Sign-on Authentication If a user has failed password authentication for a specified consecu

Pagina 271

Authentication 1-33 Figure 1-26 Screen Displayed when User is Locked Out

Pagina 272

Chapter 1: Overview 1-34 When a locked user performs authentication, the following window is displayed on the Web browser. Figure 1-27 Screen Displ

Pagina 273

Authorization 1-35 Authorization Authorization is the process that is used to make sure that the user who requests access to a resource is allowed to

Pagina 274 - Executing Applications

Chapter 1: Overview 1-36 • Therefore, the accountant can access only the resources "employment regulations" and "settlement informati

Pagina 275

Authorization 1-37 Figure 1-29 Information Required for Authorization Using Roles Role Configuration The role or role set name to be used is regist

Pagina 276

Chapter 1: Overview 1-38 Examples of Roles Table 1-5 Role Post/department Role name General employee employee Executive officer executives Account

Pagina 277

Authorization 1-39 Note If a role or role set name set in the path configuration is not defined by role configuration, access control information cann

Pagina 278 - Sample Code

v Table of Contents Chapter 1 Overview What Is Single Sign-on ...

Pagina 279 - File Explanation

Chapter 1: Overview 1-40 Updating Access Control Information The business server retains the access control information fetched from the SSO reposito

Pagina 280

Authorization 1-41 • If the access control information is updated while the business server is active, make sure that you access a protection resourc

Pagina 281

Chapter 1: Overview 1-42 High-Performance and High-Reliability System Interstage Single Sign-on supports high-performance and high-reliability system

Pagina 282

High-Performance and High-Reliability System 1-43 Figure 1-31 Load Balancing among Authentication and Repository Servers The figure above shows the

Pagina 283

Chapter 1: Overview 1-44 For an example of setting a system configuration in which multiple authentication servers are arranged to distribute the aut

Pagina 284

High-Performance and High-Reliability System 1-45 Figure 1-32 Increasing System Availability When the re-connection interval specified as an environ

Pagina 285

Chapter 1: Overview 1-46 Figure 1-33 Standby Repository takes over in the Event of a Failure This means that the Interstage Single Sign-on service

Pagina 286

High-Performance and High-Reliability System 1-47 • If the repository server (update system) stops operation as the result of some problem, user auth

Pagina 287

Chapter 1: Overview 1-48 To use SSL Accelerator during Interstage Single Sign-on operations, SSL Accelerator must be set up as follows: Client Authen

Pagina 288

High-Performance and High-Reliability System 1-49 Figure 1-36 Example of Screen Shown when Page Cannot be Displayed Linkage with Application Gateway

Pagina 289

Single Sign-on Operator's Guide: Table of Contents vi Business system public URL ...

Pagina 290

Chapter 1: Overview 1-50 The settings for a system that can be set up using the Application Gateway reverse function are explained below. Remark • I

Pagina 291

High-Performance and High-Reliability System 1-51 Examples of the reverse settings in the figure above are shown in the table below. In the URL for th

Pagina 292

Chapter 1: Overview 1-52 Figure 1-38 Using SSL Communication between Application Gateway and Authentication Server To operate using this system con

Pagina 293

High-Performance and High-Reliability System 1-53 • The clients in the intranet cannot access the protection resources in the business system. • No

Pagina 294

Chapter 1: Overview 1-54 https://sd.fujitsu.com:443/dir2/ <---------- https://sd.fujitsu.com:443/dir2/ https://sd.fujitsu.com:443/dir3/ <-----

Pagina 295

High-Performance and High-Reliability System 1-55 [Using SSL communication between Application Gateway and authentication server] Figure 1-40 Using

Pagina 296 - Variables

Chapter 1: Overview 1-56 When “Set-Cookies Header” is specified in the HTTP response header, and the path and domain that are specified to “Set-Cooki

Pagina 297 - Information

Choosing URLs 1-57 Choosing URLs This section describes how to choose the Authentication infrastructure URL, the Business system public URL, and the h

Pagina 298

Chapter 1: Overview 1-58 Figure 1-42 Using Interstage Director to Balance the Load on the Authentication Server Using SSL Accelerator The FQDN and

Pagina 299 - Appendix A

Choosing URLs 1-59 Figure 1-44 Using Both SSL Accelerator and Interstage Traffic Director Linking with Application Gateway and using SSL Communicati

Pagina 300

Single Sign-on Operator's Guide - Table of Contents vii Setting the Reference System Repository Server Information in the Authentication Server .

Pagina 301 - Repository

Chapter 1: Overview 1-60 Linking with Application Gateway and Using Non-SSL Communication between Application Gateway and Authentication Server [To e

Pagina 302

Choosing URLs 1-61 Figure 1-47 Non-SSL Communication between Application Gateway and Authentication Server viewed from the Client *2 When Interstage

Pagina 303

Chapter 1: Overview 1-62 Figure 1-48 Combining No Other Equipment or Product Using Interstage Traffic Director for Balancing the Load on the Authen

Pagina 304

Choosing URLs 1-63 Figure 1-50 Using SSL Accelerator Using both SSL Accelerator and Interstage Traffic Director The FQDN and port number of the Busi

Pagina 305

Chapter 1: Overview 1-64 Figure 1-52 Linking with Application Gateway and Enabling Clients on the Internet and Intranet to Access *1 For further d

Pagina 306 - Adding a User Role

Choosing URLs 1-65 Figure 1-53 Linking with Application Gateway and Enabling only Internet Clients to Access *1 For further details, refer to &quo

Pagina 307

Chapter 1: Overview 1-66 Not Using a Cluster System The host name of the repository server (update system) is the same as the machine on which the re

Pagina 308 - Deleting a User Role

2-1 Chapter 2 Environment Setup (SSO Administrators) This chapter explains the setup for the authentication infrastructure environment. Use the Int

Pagina 309

Chapter 2: Environment Setup (SSO Administrators) 2-2 Environment Setup Flow Authentication infrastructure environment setup includes the following

Pagina 310

Environment Setup Flow 2-3 Flow of Environment Setup by Systems Figure 2-1 Flow of Environment Setup

Pagina 311

Single Sign-on Operator's Guide: Table of Contents viii Stopping an Authentication Server...

Pagina 312

Chapter 2: Environment Setup (SSO Administrators) 2-4 Table 2-1 shows the steps required for the environment setup of various types of systems: Tab

Pagina 313

Environment Setup Flow 2-5 Setting up the authentication server on a machine and the repository server on another machine Setting up the authentic

Pagina 314

Chapter 2: Environment Setup (SSO Administrators) 2-6 Setting up the authentication server on a machine and the repository server on another mach

Pagina 315 - Changing the User Password

Environment Setup Flow 2-7 Filenames and Location of the Authentication Infrastructure Configuration Spreadsheet File name of the Authentication Inf

Pagina 316

Chapter 2: Environment Setup (SSO Administrators) 2-8 Preparation for Environment Setup Prepare a user program and design an SSO repository before

Pagina 317 - Appendix B

Preparation for Environment Setup 2-9 Designing a Registration Destination Entry Design an entry in which role configuration, user information, and

Pagina 318 - User Information

Chapter 2: Environment Setup (SSO Administrators) 2-10 User Information Example This example shows a design of registering information about two us

Pagina 319

Preparation for Environment Setup 2-11 Figure 2-3 Role Configuration and User Information Registration Destinations Preparation for a User Progra

Pagina 320

Chapter 2: Environment Setup (SSO Administrators) 2-12 Repository Server Setup This section describes the procedure for setting up a repository ser

Pagina 321

Repository Server Setup 2-13 Setting up a Repository Server for Addition of a Repository Server (Reference System) Perform the following procedure t

Pagina 322 - Role Configuration

Single Sign-on Operator's Guide - Table of Contents ix Setting the Service Dependency ...

Pagina 323

Chapter 2: Environment Setup (SSO Administrators) 2-14 − Administrator DN password (re-enter) Re-enter the password for the SSO administrator. −

Pagina 324 - Protection Resources

Repository Server Setup 2-15 Detailed settings Database Configuration − Maximum number of searchable entries Maximum number of entries that can be

Pagina 325 - Path Configuration

Chapter 2: Environment Setup (SSO Administrators) 2-16 4. Check the checkbox of the created SSO repository and click the Start button to start the

Pagina 326

Repository Server Setup 2-17 Figure 2-4 Importing User Information from the Database to the SSO Repository The procedure for importing user inform

Pagina 327

Chapter 2: Environment Setup (SSO Administrators) 2-18 Conditions for connection and an example of the settings that should be made are shown below

Pagina 328

Repository Server Setup 2-19 Conditions for connection and an example of the settings that should be made are shown below. Database to be connected

Pagina 329

Chapter 2: Environment Setup (SSO Administrators) 2-20 4. Execute the user information import command. Figure 2-5 Add Entries using the CSV Data

Pagina 330

Repository Server Setup 2-21 The data in CSV format that corresponds to the above data is as follows: user001,user001,user001,user001,user001,100

Pagina 331

Chapter 2: Environment Setup (SSO Administrators) 2-22 .com,Leader ADD,user004,user004,user004,user004,user004,100004,[email protected]

Pagina 332

Repository Server Setup 2-23 <!ELEMENT ldapdelete (#PCDATA)> <!ELEMENT ldapmodify (#PCDATA)> ]> <!-- Cannot be modified -->

Commenti su questo manuale

Nessun commento