Product Documentation
Abstract
This document contains the step-by-step instructions for configuring single sign-on (SSO) for IBM Content Navigator with a FileNet P8 repository by using IBM Security Access Manager for Web on WebSphere Application Server.
Content
To configure single sign-on integration between IBM Security Access Manager for Web and IBM Content Navigator, you must:
Before you begin
Ensure that you have the appropriate prerequisite software installed and configured in your environment.
If you plan to use IBM Security Access Manager for Web for SSO, you must be aware of the following restrictions:
Important: The following applications and components that might be part of your environment are not supported by IBM Security Access Manager for Web SSO:
If you are planning to use these components in your environment, you must configure and deploy IBM Content Navigator as a non-SSO application or deploy IBM Content Navigator in an SSO environment that supports these features, such as Kerberos/SPNEGO SSO.
- Complete the pre-deployment tasks
- Configure and deploy IBM Content Navigator with IBM Security Access Manager
- Verify your deployment of IBM Content Navigator with IBM Security Access Manager
Before you begin
Ensure that you have the appropriate prerequisite software installed and configured in your environment.
If you plan to use IBM Security Access Manager for Web for SSO, you must be aware of the following restrictions:
- You use IBM Content Navigator to connect to only IBM FileNet P8 repositories. If you configure the IBM Content Navigator web application to connect to IBM Content Manager or IBM Content Manager OnDemand repositories, you cannot use single sign-on.
Important: The following applications and components that might be part of your environment are not supported by IBM Security Access Manager for Web SSO:
- IBM Content Navigator Sync client and sync services
- IBM Content Navigator for Microsoft Office
If you are planning to use these components in your environment, you must configure and deploy IBM Content Navigator as a non-SSO application or deploy IBM Content Navigator in an SSO environment that supports these features, such as Kerberos/SPNEGO SSO.
Step 1 - Complete the pre-deployment tasks
-
- Install and configure IBM Security Access Manager for Web by using the IBM Security Access Manager for Web V 7.0 Installation Guide. For more information, see IBM Security Access Manager for Web Version 7.0 Knowledge Center.
- You must install the following Access Manager for Web components:
- Base system components
- WebSEAL
- You must install the following Access Manager for Web components:
- Install and configure Security Access Manager Runtime for Java component on the application server where you are planning to install and deploy Content Navigator. Refer to Security Access Manager Knowledge Center how to install Security Manager Runtime for Java component.
- HA systems: Install Security Access Manager Runtime for Java component on Network Deployment Manager server and each node in the cluster if they are residing on separate servers.
- After you install Access Manager Runtime for Java you need to configure it for use within the current Java Runtime Environment (JRE). For that you need to run pdjrtecfg command on each application server in cluster.
- Refer to Security Access Manager Utilities in the IBM Security Access Manager Knowledge Center and the WebSphere Application server Knowledge Center for further details and exact options applicable to your environment.
- For Java application server to communicate with Policy Server and the Trust Association Interceptor (TAI) to establish trust for a request, it requires that the SvrSslCfg utility is run on each Application Server in cluster with config action and cfg_action create option. It will result in creating the PDPerm.properties file on each application server.
- For more information and details on how to run SvrSslCfg utility, see WebSphere Application server Knowledge Center
- HA systems: Install Security Access Manager Runtime for Java component on Network Deployment Manager server and each node in the cluster if they are residing on separate servers.
- Install and configure IBM FileNet P8 Content Engine. See Product Documentation for FileNet P8 for more information.
- Install IBM Content Navigator. See Planning, Installing, and Configuring IBM Content Navigator for installation instructions. Do not deploy IBM Content Navigator.
- Install and configure IBM Security Access Manager for Web by using the IBM Security Access Manager for Web V 7.0 Installation Guide. For more information, see IBM Security Access Manager for Web Version 7.0 Knowledge Center.
Step 2 - Configure and deploy IBM Content Navigator with Security Access Manager for Web
- Complete the following tasks:
- Create two junctions, one for IBM Content Navigator and one for the integrated help system using the server task pdadmin command on the Tivoli Access Manager WebSEAL server. For more information about the syntax and the options that you use to create a junction, see the server task create entry in the WebSEAL Administration in Security Access Manager Knowledge Center.
Important: When you create the junctions, keep the following information in mind:- IBM Content Navigator and the integrated help system support only transparent junctions.
- HA systems: When you specify the IBM Content Navigator host name, specify the HTTP Server name. When you specify the port number, specify port 80.
- To create the IBM Content Navigator junction, run the following command: pdadmin>server task default-webseald-ISAM_Server create -t tcp -h IBM_Content_Navigator_host_name -p port_number -c iv_creds,iv_user,iv_user_l -b supply -x /navigator
- High Availability systems: pdadmin>server task default-webseald-ISAM_Server create -t tcp -h HTTP_host_name -p port_number -c iv_creds,iv_user,iv_user_l -b supply -x /navigator
For example: pdadmin>server task default-webseald-abc.net.com create -t tcp -h xyz.net.com -p 9080 -c iv_creds,iv_user,iv_user_l -b supply -x /navigator - High Availability systems: pdadmin>server task default-webseald-abc.net.com create -t tcp -h xyz.net.com -p 80 -c iv_creds,iv_user,iv_user_l -b supply -x /navigator
- High Availability systems: pdadmin>server task default-webseald-ISAM_Server create -t tcp -h HTTP_host_name -p port_number -c iv_creds,iv_user,iv_user_l -b supply -x /navigator
- To create the integrated help system junction, run the following command: pdadmin>server task default-sebseald-ISAM_Server create -t tcp -h IBM_Content_Navigator_host_name -p port_number -x /wcdocs
For example: pdadmin>server task default-webseald-abc.net.com create -t tcp -h xyz.net.com -p 9080 -x /wcdocs
- To create the IBM Content Navigator junction, run the following command: pdadmin>server task default-webseald-ISAM_Server create -t tcp -h IBM_Content_Navigator_host_name -p port_number -c iv_creds,iv_user,iv_user_l -b supply -x /navigator
- Run the IBM Content Navigator Configuration and Deployment Tool and create a new deployment profile for WebSphere Application Server.
Run all of the configuration and deployment tasks that apply to your system. For more information, see http://www.ibm.com/support/knowledgecenter/SSEUEX_2.0.3/com.ibm.installingeuc.doc/eucde000.htm" target="_blank">Configuring and deploying IBM Content Navigator.- When you run the Configure the IBM Content Navigator Web Application task, ensure that you select Application server authentication for the IBM Content Navigator authentication option.
- Optional: WebSEAL has the option to prevent cross-site scripting, which is a common security problem for web servers. To enable this option, add the HTTPOnly attribute Failover Set-Cookie headers and change the value of the use-http-onlycookies in the server stanza of the WebSEAL configuration file to yes. The WebSEAL default value is use-http-only-cookies=no.
- Restart the application server where IBM Content Navigator is deployed. Restart the WebSEAL server instance.
- Note: IBM Content Navigator configured with Security Access Manager and WebSEAL SSO now supports ISAM form-based authentication. You can now login to Navigator desktop using ISAM login form.
- Create two junctions, one for IBM Content Navigator and one for the integrated help system using the server task pdadmin command on the Tivoli Access Manager WebSEAL server. For more information about the syntax and the options that you use to create a junction, see the server task create entry in the WebSEAL Administration in Security Access Manager Knowledge Center.
Step 3 - Verify your deployment of IBM Content Navigator with Security Access Manager
- To verify the deployment: Important: You must provide the Security Access Manager credentials to access navigator desktop.
Note: Login to IBM Content Navigator repositories from the admin desktop is manual, and repositories will not get logged in to automatically as part of SSO.
In a web browser, enter a URL with the following format:http://ISAM_Server/context_root
The default context root is navigator. For example, http://ISAM_Server_name/navigator
The default context root is navigator. For example, http://ISAM_Server_name/navigator
[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSEUEX","label":"IBM Content Navigator"},"Component":"--","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"Before 3.0.6","Edition":"","Line of Business":{"code":"LOB18","label":"Miscellaneous LOB"}}]
Was this topic helpful?
Document Information
Modified date:
28 January 2020
UID
swg27042202