Integrating and configuring Novell Access Manager 3.0 with IDM Portal 3.01

  • 3874683
  • 17-Nov-2006
  • 26-Apr-2012

Environment

Novell Access Manager 3.0
IDM portal 3.01
Identity Server FCS build 491
Access Gateway (NetWare or Linux) FCS build

Resolution

Table of Contents

1. Basic Information
2. Known Issues
3. Configuration Notes
4. Miscellaneous


1 Basic Information

Access URL's:

Default URL for the IDM Portal guest page is similar to http(s)://:8080/IDM. A Login link is available on this page.

To access the login form directly, the default URL is similar to http(s)://:8080/IDM/portal/portlet/IDMLoginPortlet.

Single Sign On (Access Gateway to Portal):

Form Fill or Identity Injection can be used to provide single sign on from the Access Gateway to the IDM Portal.

Single Sign On (within the Portal):

The Portal has its own concept of Single Sign On, sometimes referred to as "Scoped Pathsā€. Scoped Paths are used to share the user's authentication information within and among the portlets and content web servers. Configuration of Scope Paths is done using the Administration portlet.

Portlet Connection types:

When accessing the Portal through an Access Gateway (AG), it is important to understand the behavior of connections required by the portlets in use. Most portlets will use one of the following connection scenarios:

a) Portal Server-to-Content Web Server only


A server-to-server connection is established between the Portal server and the origin web server providing content for the portlet. There is no need for the user's browser to connect directly to the Content Web Server. The portlet's connection URL for the content web server should be configured to allow a direct connection between the servers (i.e. does not get routed through Access Gateway).

b) Browser-to-Content Web Server only

In this case, the portlet simply provides links which redirect the browser to the appropriate Content Web Server. If the Content Web Server is also being accelerated by Access Gateway, the URL('s) configured in the portlet would normally be configured to allow Access Gateway rewriting to occur (ie. URL's sent to the browser are rewritten to the published DNS name, scheme, and port of the accelerator for the Content Web Server).

c) Portal Server-to-Content Web Server AND Browser-to-Content Web Server

In this case, the portal server establishes a connection with the Content Web Server, perhaps to provide authentication on behalf of the user and to populate the portlet with initial data, then redirects the browser to connect directly to the Content Web Server when the user clicks links within the data displayed in the portlet.

If the Content Web Server is also being accelerated by Access Gateway, the URL('s) configured in the portlet would normally be configured to allow server-to-server connections to occur directly (i.e. NOT through Access Gateway) and URL's for browser-to-Content Web Server connections through Access Gateway get rewritten to the published DNS name, scheme, and port of the accelerator for the Content Web Server


Portlets that use Portal Server to Content Web Server connections only:

  • Network file portlet (CIFS, NJCL, RMI)

  • Webmail portlet (POP and IMAP)


Portlets that use Portal Server to Content Web Server AND Browser-to-Content Web Server connections:

  • GroupWise Calendar portlet

  • GroupWise mail portlet

  • GroupWise mail/calendar portlet

  • GroupWise WebAccess portlet

  • NetStorage portlet


2 Known Issues

2.1 LAG and NAG rewriter:

- Problem: Rewriter issues using path-based multi-home accelerators with option "Remove Path on Fillā€ enabled.

-Workaround: Use other accelerator types. Domain-based, or path-based multi-home with option "Remove Path on Fillā€ disabled, do not have these issues.

Rewriter issues using path-based multi-home accelerators with option "Remove Path on Fillā€ enabled.

-Workaround: use other accelerator types. Domain-based, or path-based multi-home with option "Remove Path on Fillā€ disabled, do not have these issues.


2.2 IDM:

Problem : Java exception occurs if using Identity Injection when browsing directly to the URL of the login portlet (http://hostname:port/IDM/portal/portlet/IDMLoginPortlet).

Workaround: when using Identity Injection for sso, use the URL of the guest page (http://hostname:port/IDM) instead of specifying the full path.


Problem: GW Mail Portlet returns a Cookie Path value of /servlet/webacc instead of /gw/webacc as configured. Results in user being re-prompted for authentication when performing actions such as creating a new mail message.

Workaround: The GroupWise Webaccess portlet can be used to access the Calendar



3. LAG proxy

Problem: Intermittent timeouts may occur when using the Webmail portlet. LAG appears to not be forwarding some packets to the IDM portal server

Workaround: refresh the browser, or retry the failed operation.

Intermittent timeouts may occur when using the Webmail portlet. LAG appears to not be forwarding some packets to the IDM portal server

-Workaround: refresh the browser, or retry the failed operation.



3 Configuration Notes

Portal features and portlets tested:

Admin portlet

Create portlet

GW Calendar portlet

GW Mail / Calendar portlet

GW Mail portlet

GW WebAccess portlet

IDM Challenge Response

IDM Change Password

IDM Forgot Password

IDM Hint Definition

IDM Login Portlet

JSP-Edit Availability

JSP-Proxy Mode

JSP-My Delegated Assignments

JSP-My Proxy Assignments

JSP-My Requests

JSP-My Tasks

JSP-Request Resource

JSP-Request Team Resource

JSP-Team Availability

JSP-Team Delegate Assignments

JSP-Team Proxy Assignments

JSP-Team Requests

JSP-Team Tasks

Detail Portlet

NetStorage Portlet

Network File Portlet

Org Chart Portlet

Scoped Paths

Search List Portlet

WebMail Portlet


NAM features tested:

SSL: disabled both sides, enabled Public side only, and enabled both sides of proxy

Web Server Host Name: different than Published DNS name of accelerator

Modified rewriter profile for use with pbmh accelerator

Single Sign On using Formfill with local secrets and Novell SecretStore

Single Sign On using Identity Injection

Protected resource with IDP authentication

Simultaneous logout


Accelerator types tested:

Non multi-home:

No problems specific to this configuration were noted. Protected resource path is /IDM/*.

Domain-based multi-home:

No problems specific to this configuration were noted. Protected resource path is /IDM/*.

Path-based multi-home with option "Remove Path on Fillā€ disabled:

No problems specific to this configuration were noted. Sub-path match string is "/IDMā€, protected resource path is /IDM/*.

Path-based multi-home with option "Remove Path on Fillā€ enabled:

This configuration is problematic and is not recommended with NAM 3.0.


Single Sign On (Access Gateway to Portal):

Either Identity Injection or Form Fill can be used to provide single sign on from Access Gateway to the IDM portal.

Identity Injection:

  1. Configure an Identity Injection policy to populate the Authorization headers sent from the Access Gateway to Portal with the username and password that was used for user authentication to the Access Gateway/IDP:

  • In iManager/DevMan, select the Policies link under the Access Manager task
  • In the Policy List, click New. Provide a name. In the Type drop-down list, select Access Gateway: Identity Injection. Press OK.
  • On the Edit Policy page, click New under the Actions section. Select "Inject into Authentication Headerā€ from the drop-down list.

  • From the "User Name: drop-down list, select the source of the username. For example, "Credential Profileā€. A second drop-down list will now appear next to User Name:. Select an appropriate value from the list. For example, if Credential Profile was chosen as the username source, selecting LDAP Credentials->LDAP User DN will populate the Authorization header's username with the LDAP fdn of the user.

    From the "Password:ā€ drop-down list, select the source of the password. For example, "Credential Profileā€. A second drop-down list will now appear next to Password:. Select an appropriate value. For example, if Credential Profile was chosen as the password source, selecting LDAP Credentials->LDAP Password will populate the Authorization header's password with the password used for Access Gateway authentication.

  • Press OK and Apply Changes to save the policy


  1. Enable the Identity Injection policy on the Portal accelerator's protected resource

  • On the Protected Resource page of the Portal accelerator, click "[None]ā€ under the Identity Injection column of the protected resource defined for the Portal.

  • In the "Identity Injection Policy Listā€, select (check) the Identity Injection policy created above, then click "Enableā€ in the menu. Press OK, then Apply changes in the usual way.


Formfill:

Form Fill can also be used to provide single sign on and simultaneous logout to/from the Portal.

On the last pages of this document is a sample Form Fill policy for Portal which includes actions for login success, login failure, and simultaneous logout. This policy can be imported directly into iManager/Devman. After importing, be sure to edit the URL's in the policy as appropriate for the customer environment, modify the Fill Options, and enable the policy on the Portal accelerator's protected resource for the IDM Portal.

Steps below:

  1. Create the Form Fill policy

  • Copy the sample Form Fill policy shown at the end of this document to a .txt file

  • In iManager/DevMan, select the Policies link under the Access Manager task

  • In the Policy List, click Import. Browse to the .txt file created above, then OK to import the policy.

  • Click the link to open the policy. Under each action, edit the "Redirect to URL:ā€ field as appropriate for the environment.

  • Edit the "Fill Optionsā€ section of the login action with appropriate values. This example policy uses "Shared Secretā€ as the storage location. After importing, "[invalid value]ā€ will likely be displayed. Select the drop-down list to select or create a new Shared Secret and key name for each input field.

  • Press OK and Apply Changes to save the policy


  1. Enable the Form Fill Policy on the Portal accelerator's protected resource

  • On the Protected Resource page of the Portal accelerator, click "[None]ā€ under the Form Fill column of the protected resource defined for the Portal.

  • In the "Form Fill Policy Listā€, select (check) the Form Fill policy created above, then click "Enableā€ in the menu. Press OK, then Apply changes in the usual way.


Single Sign On (within the Portal):

While the Access Gateway can be configured to use Form Fill or Identity Injection to provied single sign on for user authentication to the IDM Portal, the Portal must also be configured to provide its own form of single sign on among the portlets and content web servers. Single sign on behavior within the portal itself and to its content web servers is sometimes referred to as "Scoped Pathsā€ in the IDM documentation, sometimes simply as single sign on.

How Scoped Path's are configured and used depends on how the user initially gets authenticated to the portal (i.e. through manual logins, Form Fill, Identity Injection, etc), and on the credential format requirements of the individual portlets being used (simple name, LDAP name, etc).

General guidelines for using Scoped Paths with Identity Injection and Form Fill:

When using Identity Injection to provide single sign on to the portal, the following scoped path entries are available

  • ${Application/login-pass} returns user's password

  • ${Application/login-user} returns user's name in the format present in the Authorization header as populated by Identity Injection. For example, if the Identity Injection policy uses Credential Profile->LDAP Credentials->LDAP User DN for the username, the username in the Authorization header forwarded to the Portal will be similar to"cn=user1,ou=users,o=novellā€, and that would be the name returned by scoped path ${Application/login-user}.

    If the policy uses Credential Profile->LDAP Credentials->LDAP User Name, the username in the Authorization header will be similar to "user1ā€.

  • ${User/canonical} returns dot-delimited name, ex. "user1.users.novellā€

  • ${User/simpleid} returns simple name, ex."user1ā€


When using Form Fill to provide single sign on to the Portal, use the following scoped path entries:

  • ${Application/login-pass} returns user's password

  • ${Application/login-user} Returns user's name in the format entered into the IDM Login form. For example, if the initial user login to Portal is done using a fully distinguished name like "user1,ou=users,o=novellā€, scoped path ${Application/login-user} will return that name. If the login is with a simple name like "user1ā€, ${Application/login-user} returns"user1ā€.

  • ${User/canonical} returns dot-delimited name, ex. "user1.users.novellā€

  • ${User/simpleid} returns simple name, ex."user1ā€

    To determine which scoped path to use for specific portlets, see the IDM Documentation "Accessory Porlet Reference Guide.


Simultaneous Logout:

The Portal can be configured to detect the presence of an Access Gateway session cookie for the purpose of performing simultaneous logout . An Identity Injection policy can be configured to include the session cookie in the Cookie: header of packets being sent to the Portal. Steps below:

  1. Create the Identity Injection policy to forward the AG session cookie:

  • In iManager/DevMan, select the Policies link under the Access Manager task

  • In the Policy List, click New. Provide a name. In the Type drop-down list, select Access Gateway: Indentity Injection. Press OK.

  • On the Edit Policy page, click New under the Actions section. Select"Inject into Cookie Headerā€ from the drop-down list.

  • Press OK and Apply Changes to save the policy

  1. Enable the policy on the Portal accelerator's protected resource

  • On the Protected Resource page of the Portal accelerator, click"[None]ā€ under the Identity Injection column of the protected resource defined for the Portal.

  • In the "Identity Injection Policy Listā€, select (check) the Identity Injection policy created above, then click "Enableā€ in the menu. Press OK, then Apply changes in the usual way.

  1. Enable Portal to detect the presence of the session cookie

  • On the Portal server, run /novell/idm/configupdate.sh to launch the User Application Configuration tool.

  • Press the "Show Advanced Optionsā€ button

  • Scroll down to section "iChain Settingsā€

  • Select checkbox "ICS Logout Enabledā€

  • In the ICS Logout Page field, enter the URL of the Portal acceleratorwith path /cmd/ICSLogout (ex: http:///cmd/ICSLogout).

  • Click OK to save and redeploy the updated WAR.


4 Miscellaneous

Sample Form Fill policy for Portal (import into iManager/Devman):

<
?xml version="1.0" encoding="UTF-8"?>