Troubleshooting
Problem

- Navigate to Security > Global security. Then select Custom properties.
- Set the property com.ibm.websphere.security.performTAIForUnprotectedURI = true
- Set the property com.ibm.websphere.security.DeferTAItoSSO
to com.ibm.ws.security.web.saml.ACSTrustAssociationInterceptor
Note: If the property exists, replace the value. If it does not exist create it.
- Navigate to Security > Global security. Then select Custom properties.
- Check the list for com.ibm.websphere.security.InvokeTAIbeforeSSO
- If com.ibm.websphere.security.InvokeTAIbeforeSSO does not exist, select New and define the following custom property information:
Name: com.ibm.websphere.security.InvokeTAIbeforeSSO
Value: com.ibm.ws.security.web.saml.ACSTrustAssociationInterceptor
If com.ibm.websphere.security.InvokeTAIbeforeSSO exists:
Select com.ibm.websphere.security.InvokeTAIbeforeSSO
Add a comma to the end of the existing value.
Add com.ibm.ws.security.web.saml.ACSTrustAssociationInterceptor to the end of the existing value.
- Select OK.
- Apply and Save the changes.
- Navigate to Security > Global Security >RMI/IIOP security > CSIv2 inbound communications > Trusted authentication realms – inbound.
- Select Trust realms as indicated below.
- Add the SSO realm to the list of trusted realms. This value must be the SSO issuer/entityID for the right environment.
- Ensure you do not add blanks at the beginning or end of the realm.
- Apply and Save the changes
- Navigate to Security > Global security > RMI/IIOP security > CSIv2 outbound communications > Trusted authentication realms – outbound.
- Select Trust realms as indicated below.
- Add the SSO realm to the list of trusted realms. This value must be the SSO issuer/entityID for the right environment.
- Ensure you do not add blanks at the beginning or end of the realm.
- Apply and Save the changes.
- Navigate to Applications > Applications types > WebSphere enterprise applications. Then select the enterprise application you are protecting with SSO.

- Select Security role to user/group mapping.

- Check all roles.

- From the Map Special Subjects drop down list, select All authenticated in Trusted Realms. Then select OK and Save the changes.

Note: If you don't find the option: Select Security Role to user/Group Mapping in your WAS, you will need to check your web.xml and add the security constraint and role there. Then you will need to do a re-deploy, and you should see the option in your WAS now.
- Navigate to Security > Global Security > Web and SIP Security > Trust Association.

- Select Enable trust association. Then Apply and Save the changes.

- Select Interceptors.

- Select New.

- Interceptor class name must be com.ibm.ws.security.web.saml.ACSTrustAssociationInterceptor
- Create custom properties as follows :
Note: The property names are case sensitive.
|
Name |
Value |
Comment |
|
sso_1.sp.acsUrl |
https://<hostname>:16311/samlsps/netcool |
This value depends on the SAML app context root, the default is samlsps. If you modify the SAML ACS application context root you must be careful when you set this value. |
|
sso_1.sp.idMap |
localRealm |
This property specifies how the SAML token is mapped to the subject. |
| sso_1.idp_1.EntityID | SSO issuer/entity url | |
| sso_1.idp_1.SingleSignOnUrl | SSO issuer/entity url | |
| sso_1.sp.login.error.page | SSO issuer/entity url | |
| sso_1.sp.filter | request-url^=ibm/console|snoop |
- Apply and Save the changes.
- Note1: NOI Hybrid: sso_1.sp.filter = request-url^=oauth2/login.jsp|snoop
- Note2: WEBGui static html files - sso_1.sp.filter = request-url=/ibm/console;request-url!=/ibm/console/webtop. Also if on cross-domain, ensure /ibm/console/webtop/mobile/<name of html file> set in CSRF property in DASH->Settings->Console Properties page and restart WebSphere profile server.
Document Location
Worldwide
Log InLog in to view more of this document
Was this topic helpful?
Document Information
Modified date:
14 May 2024
UID
ibm17150687