![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |
• The configuration mechanism for WS security policies on Facade Operations tab in TIBCO API Exchange Gateway 2.x is provided for the backward compatibility to use with TIBCO ActiveMatrix Service Gateway 1.2.0 product release. This configuration mechanism is deprecated in 2.x release of the software.
• WS Security is supported using the security policies in the TIBCO API Exchange Gateway 2.x release. Refer to Security Policies chapter for details on how to use security policies.
− Identity service providers makes use of public and private credentials for common trust and identity operations such as token signing, data encryption and creation of SSL connections. The main types of identity service providers are Trust Identity Provider and Subject Identity Provider.Table Types of Service Providers lists the types of service providers used by WSS configuration.
Table 93 Types of Service Providers
Table Properties for LDAP Authentication Service Provider describes the properties for LDAP Authentication Service Provider.
Boolean intent property indicates if the LDAP authentication method can be enforced on the request message or not. Possible values are true or false.If the value of this property set to true, the request message must contain a valid username token. The default value is com.sun.jndi.ldap.LdapCtxFactory (Sun's LdapCtxFactory). Specifies the URL to connect to the LDAP directory server. The LDAP URL is defined as: ldap://hostname:port. The LDAP SSL URL is defined as: ldaps://hostname:port The time (in milliseconds) to wait for a response from the LDAP directory server. A value of 0 causes it to wait indefinitely. If a negative number is specified, it uses the provider's default setting. The name of the attribute in the user object that represents the user's name. The value depends on which LDAP server is used. If you are using ActiveDirectory LDAP Server, set this value as CN. If SunOne or OpenLDAP LDAP Server is used, set this value as uid. For example, mail givenname For example, ou=people,ou=na,dc=example,dc=org Specifies the expression to be used for searching in admin mode against potential user objects. For example, the search expression is specified as: (&(uid={0})(objectClass=person)).This property is relevant only when credentialProvider property is set and the binding is done as an administrator; otherwise userDNTemplate is used. For example, uid={0},ou=employee,ou=tsi,o=tibco Same as userAttributesExtra property but this is specified in list form. A boolean property which determines if the entire sub-tree is searched or not. If a true value is specified, the entire sub-tree starting at the base DN is searched. Otherwise, the nodes one level below the base DN are searched. For example, ou=groups,ou=na,dc=example,dc=org Indicates the flag to determine if nested groups should be searched for. If the value is not set to true, the groups are only returned in which the user is the direct member.The default value is false. Specifies the expression to be used for searching against potential groups. For example, search expression is specified as: (&(uid={0})(objectClass=person)).For example, its defined as uniquemember={0} for SunOne, cn={0} for OpenLDAP, member={0} for Active Directory. A boolean property which determines if the entire sub-tree is searched or not. If a true value is specified, the entire sub-tree starting at the base DN for groups is searched. Otherwise, the nodes one level below the base DN are searched. The default value is noGroupInfo.
• If the value has userHasGroups,you must specify the attribute name which points the groups the user belongs to in the userAttributeGroupsName property.
• If the value has userDNHasGroups,the userAttributeGroupsName property has the attribute name which hold the DNs of groups to which the user belongs. You must specify groupAttributeGroupsName property to get a specific part of the DN name.
• If the value has groupHasUsers,each group object includes a list of users that belong to the group.
• If the value has noGroupInfo, group memberships are not handled. Depends on value of groupIndication. Required if the groupIndication property has groupHasUsers value.
• groupHasUsers: Specifies the group attribute holding the name of group.For example, the value is defined as cn for OpenLDAP server, sAMAccountName for ActiveDirectory LDAP server.
• userHasGroups:Specifies the name of the group. If this is not specified, the whole DN of the group is used. For example, the value is defined as cn for OpenLDAP server. For example, the value is defined as uniqueMember for OpenLDAP server, member for ActiveDirectory LDAP server. Specifies the attribute name if the groupIndication property has groupHasUsers value. It specifies the name of the attribute in each group object denoting its users. The default value is false
• ASG_CONFIG_HOME/default/wss/req_usernametoken_ldapbind.properties
• ASG_CONFIG_HOME/default/wss/req_usernametoken_ldapsearch.properties
• ASG_CONFIG_HOME/default/wss/req_usernametoken_ldapbindssl.propertiesTable Properties for Trust Identify Provider (TIP) describes the properties for Trust Identify Provider.
If the value of this property set to true, the request message must have valid signatures.
• See ASG_CONFIG_HOME/default/wss/req_verifysig.properties file for the properties and example configuration for verifying the signature in the request message.
• See ASG_CONFIG_HOME/default/wss/resp_encrypt.properties file for the properties and example configuration for encrypting the response message.Table Properties for Subject Identify Provider (SIP) describes the properties for Subject Identify Provider.
If the value of this property set to true, the request message must be encrypted.
• See ASG_CONFIG_HOME/default/wss/req_decrypt.properties file for the properties and example configuration for decrypting a request message.
• See ASG_CONFIG_HOME/default/wss/resp_sign.properties.properties file for the properties and example configuration for encrypting a request message.
• See ASG_CONFIG_HOME/default/wss/req_decrypt_verifysig.properties file for the properties and example configuration for decrypting and verifying signatures for the request message.
• See ASG_CONFIG_HOME/default/wss/resp_sign_and_encrypt.properties file for the properties and example configuration for signing and encrypting the response message.TIBCO API Exchange Gateway provides the sample configuration file for the shared resources for each of the security type profile. It is recommended to use the sample files as templates and edit the properties as per your requirement. The sample files are located in the ASG_CONFIG_HOME/asg/default/wss directory.The sample file req_usernametoken_ldapbind.properties for LDAP shared resource configuration is located in the following directory: ASG_CONFIG_HOME/asg/default/wssThe sample file req_usernametoken_ldapbindssl.properties for LDAP shared resource configuration is located in the following directory: ASG_CONFIG_HOME/asg/default/wssThe sample file req_usernametoken_ldapsearch.properties for LDAP shared resource configuration is located in the following directory: ASG_CONFIG_HOME/asg/default/wssTIBCO API Exchange Gateway requires certain properties to be defined for this type. These properties are defined in a file, which can be imported in the configuration GUI. See Define the WSS Configuration Properties fileThe sample file resp_sign.properties describes the keystore properties required to sign the message. This file is located in the following directory: ASG_CONFIG_HOME/asg/default/wssTIBCO API Exchange Gateway requires certain properties to be defined for this type. These properties are defined in a file, which can be imported in the configuration GUI. See Define the WSS Configuration Properties fileThe sample file resp_encrypt.properties describes the certificate keystore properties required to encrypt the message. This file is located in the following directory: ASG_CONFIG_HOME/asg/default/wssThe WSS tab on the configuration allows you to register the WSS resources with TIBCO API Exchange Gateway.
2. Click WSS tab.
Table 97 WSS Configuration
• This section explains the steps to define a WSS enabled security operation. An operation is WSS enabled using the Operations tab of the GUI.
1. On the configuration GUI, click ROUTING tab.
2. Click the Facade Operations tab.
4. Check the Enable WSS check box.
Table 98 WSS Enabled Operation Configuration This is the name of the WSS configuration from WSS tab. The property file from this configuration is used for northbound request processing. This is the name of the WSS configuration from WSS tab. The property file from this configuration is used for northbound response processing.
![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |