Configuring identity mapping with a WS-Trust V1.3 STS (TFIM V6.2)

Configure a WS-Trust V1.3 compliant Security Token Service (STS), such as Tivoli® Federated Identity Manager (TFIM) V6.2, to map the incoming security token and, if required, to authenticate and authorize it.

Before you begin

Before you can configure a message flow to perform identity mapping, you need to check that an appropriate security profile exists, or create a new security profile. For information about security profiles, see Creating a security profile.

About this task

To configure TFIM V6.2 to map an incoming security token, you must create a custom module chain in TFIM, which performs the security operations. The TFIM configuration controls the token type that is returned from the mapping.

When you use a WS-Trust V1.3 STS for identity mapping, a request is made to the security token server with the following parameters, which control the STS processing:
  • RequestType
  • Issuer
  • AppliesTo
If you are using TFIM V6.2, these parameters are used in the selection of the module chain.

The security manager invokes the WS-Trust v1.3 provider only once, even if it is set for additional security operations (such as authentication or authorization). As a result, when you are using TFIM V6.2, you must configure a single module chain to perform all the required authentication, mapping, and authorization operations.

When the security profile includes a mapping operation, the STS (for example, TFIM V6.2) must return a security token in its response. The STS can return the original unmodified token if no token exchange is required.

For more information about these parameters, see:Authentication, mapping, and authorization with TFIM V6.2 and TAM .

The WS-Trust v1.3 specification, published by OASIS, is available at:
http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.html

For information on how to configure TFIM, see the IBM Tivoli Federated Identity Manager product documentation online.

Follow these steps to enable an existing message flow to perform identity mapping.

Procedure

Using the BAR editor, select a security profile that has mapping enabled.
You can set a security profile on a message flow or on individual input nodes. If no security profile is set for the input nodes, the setting is inherited from the setting on the message flow.
  1. In the IBM Integration Toolkit, right-click the BAR file, then click Open with > BAR Editor.
  2. Click the Manage and Configure tab.
  3. Click the message flow or node on which you want to set the security profile.
    The properties that you can configure for the message flow or for the node are displayed in the Properties view.
  4. In the Security Profile Name field, enter the name of a security profile that has mapping enabled.
  5. Save the BAR file.