You must configure single sign-on to allow federation or
console integration between Netcool®/Impact and
the IBM Dashboard Applications Services Hub.
For single sign-on to work you need a common user repository
between your products, for example LDAP or ObjectServer.
Also, your SSO parameter settings must be consistent between your
products.
About this task
Enable single sign-on to avoid having to reenter your user
credentials across IBM products. To configure single sign-on, complete
the following steps.
- Set up these parameters in the Dashboard Applications Services
Hub web administrator console. Customize the parameter values for
the SSO
Domain name parameters to avoid session issues
between the SSO and non-SSO web application products that might be
using the same default SSO Domain name name value.
- LTPA cookie name
- Default value is
LtpaToken2
- Domain name
- The SSO domain name
- Realm name
- The SSO realm name
- In the WebSphere console, set up the global security details.
- Log in to the WebSphere Application Server on the Jazz
for Service Management dashboard server, by selecting Console
Settings and WebSphere Administrative Console.
- Select Launch WebSphere Administrative Console.
- Under the Security node, select
the Global Security link.
- Under the User account repository section,
select Configure.
- Configure the Realm name and
make note of the name for the Impact Realm configuration.
- Select Ok and save the configuration.
- Under the Security node, select
the Global Security link.
- Under the Authentication section,
select the Web and SIP security node.
- Select the Single sign-on (SSO) link.
- Configure the Domain name to
the domain of the hosts running Dash and Impact. Make a note of the
domain name for the Impact configuration.
- Configure the LTPA V2 cookie name
to a unique value. The default is
LtpaToken2. Make
a note of the LTPA V2 cookie name for the Impact configuration.
- Select Ok and save the configuration.
- In the WebSphere console, add the Netcool/Impact SSL
certificate into the Dashboard Applications Services Hub truststore.
- Log in to the WebSphere Application Server on the Jazz
for Service Management dashboard server, by selecting Console
Settings and WebSphere Administrative Console.
- Select Launch WebSphere Administrative Console.
- Under the Security node, select
the SSL certificate and key management link.
- Under the Related Items section,
select the Key stores and certificates link.
- Select the NodeDefaultTrustStore keystore.
- Under the Additional Properties section,
select the Signer Certificates link.
- Select Retrieve from port.
- Enter the Host, Port,
and Alias details for theGUI Server.
- Select Retrieve signer information.
- Select Ok and save the configuration
- Export the
ltpa.keys file from the Dashboard
Applications Services Hub and apply a password to the ltpa.keys file.
- Log in to the WebSphere Application Server on the Jazz
for Service Management dashboard server, by selecting Console
Settings and WebSphere Administrative Console.
- Select Launch WebSphere Administrative Console.
- Under the Security node, start
the Global security page.
- On the right, select the LTPA link.
- In the password fields, type
a password to use for the
ltpa.keys.
- Enter the location where the key is to be exported.
For example, /tmp/ltpa.keys.
- Select Export Keys.
- Copy the exported
ltpa.keys file into Netcool/Impact,
into the following directories:
- $IMPACT_HOME/wlp/usr/servers/<server name>/resources/security/ltpa.keys For
the Impact Server.
- $IMPACT_HOME/wlp/usr/servers/ImpactUI/resources/security/ltpa.keys For
the GUI Server.
-
Run the single sign-on configuration script
$IMPACT_HOME/install/security/configImpactSSO.sh, specifying the same parameter
values that are referenced in step 1, enter the command.
If you exclude the password parameters, the script will ask you to enter them via a
password prompt.
configImpactSSO.sh <realmname> <LTPA cookie name> <Domain name>
<LTPA key password> <Admin password>
Remember: If you run either of the authentication scripts,
confAuth4OMNIbus or confAuth4LDAP and you had SSO running
previously, you must rerun the SSO configImpactSSO script again.
- Clear the cache from the browser.
-
If there are multiple DASH or Netcool/Impact servers
deployed, you must also ensure that the following conditions are met:
- All the servers are using the same
ltpa.keys file.
- Go to the first DASH server and export the keys, then
import it into the second DASH and Netcool/Impact Liberty
profile. To import LTPA keys into DASH, follow step 3. Use the
ltpa.keys file
that you exported from the first DASH server, and in the final step
of step 3, click Import Keys instead of Export
keys.
- Ensure that all servers are using a common user repository.
What to do next
Use the Fully Qualified Domain Name (FQDN) to access the
URL for Netcool/Impact and
Jazz for Service Management SSO console integration.