Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

IBM Websphere Plugin

Apache CXF Fediz ships a plugin to secure an IBM Websphere 7/8 Application Server using WS-Federation.

This page describes how to enable Federation for a IBM Websphere Application Server (WAS) instance hosting Relying Party (RP) applications. This configuration is not for a Websphere instance hosting the Fediz IDP and IDP STS WARs but for applications that use SAML assertions for authentication. After this configuration is done, the Websphere-RP instance will validate the incoming SignInResponse created by the IDP server.

...

  1. Open the Administative Console with Administrator privileges and navigate to Security / Global security
  2. Ensure Application security is enabled
  3. Navigate to Security / Global security / Web and SIP security and select Trust association
  4. Check the Enable trust association check box
  5. Select Interceptors
  6. Click on New and specify the Interceptor class name as org.apache.cxf.fediz.was.tai.FedizInterceptor

Property

Value

config.file.location

Specify the path to the fediz-config.xml file

role.group.mapper

Specify the class of the Role to Group Mapper
org.apache.cxf.fediz.was.mapper.FileBasedRoleToGroupMapper

groups.mapping.file

Specify the path to the Role - Group mapping file

groups.mapping.refresh.timeout

Specify the refresh time (in sec) to reload the Group mapping file

The file defined in groups.mapping.file must have the following structure:

Code Block
xml
xml
borderStylesolid
titleroleGroupMapping.xmlborderStylesolid
<?xml version="1.0" encoding="UTF-8"?>
<mapping>
  <samlToJ2EE>
    <claim>User</claim>
    <groups>
      <j2eeGroup>Authenticated</j2eeGroup>
      <j2eeGroup>Users</j2eeGroup>
    </groups>
  </samlToJ2EE>
  <samlToJ2EE>
    <claim>Manager</claim>
      <groups>
        <j2eeGroup>Manager</j2eeGroup>
        <j2eeGroup>Authenticated</j2eeGroup>
      </groups>
  </samlToJ2EE>
  <samlToJ2EE>
    <claim>Admin</claim>
      <groups>
        <j2eeGroup>Admin</j2eeGroup>
        <j2eeGroup>Authenticated</j2eeGroup>
      </groups>
  </samlToJ2EE>
</mapping>

...