Login mappings collection

Use this page to view a list of configurations for validating security tokens within incoming messages. Login mappings map an authentication method to a Java Authentication and Authorization Service (JAAS) login configuration to validate the security token. Four authentication methods are predefined in the WebSphere Application Server: BasicAuth, Signature, IDAssertion, and Lightweight Third Party Authentication (LTPA).

Important: There is an important distinction between Version 5.x and Version 6 and later applications. The information in this article supports Version 5.x applications only that are used with WebSphere Application Server Version 6.0.x and later. The information does not apply to Version 6.0.x and later applications.
To view this administrative console page for the server level, complete the following steps:
  1. Click Servers > Application servers > server_name.
  2. Under Security, click Web services: Default bindings for Web services security.
  3. Under Additional properties, click Login mappings.
  4. Click either New to create a new login mapping configuration or click the name of an existing configuration.
To view this administrative console page for the application level, complete the following steps:
  1. Click Applications > Enterprise applications > application_name.
  2. Click Manage modules > URI_name.
  3. Under Web Services Security properties, click Web services: Server security bindings.
  4. Click Edit under Request receiver binding.
  5. Click Login mappings.
If you click Update runtime, the Web services security run time is updated with the default binding information, which is contained in the ws-security.xml file that was previously saved. After you specify the authentication method, the JAAS configuration name, and the Callback Handler Factory class name on this panel, you must complete the following steps:
  1. Click Save in the messages section at the top of the administrative console.
  2. Click Update runtime. When you click Update runtime, the configuration changes made to the other Web services also are updated in the Web services security run time.
Important: If the login mapping configuration is not found on the application level, the Web services run time searches for the login mapping configuration on the server level.

Authentication method

[Version 5 only]

Specifies the authentication method used for validating the security tokens.

The following authentication methods are available:
BasicAuth
The basic authentication method includes both a user name and a password in the security token. The information in the token is authenticated by the receiving server and is used to create a credential.
Signature
The signature authentication method sends an X.509 certificate as a security token. For Lightweight Directory Access Protocol (LDAP) registries, the distinguished name (DN) is mapped to a credential, which is based on the LDAP certificate filter settings. For local OS registries, the first attribute of the certificate, usually the common name (CN) is mapped directly to a user name in the registry.
IDAssertion
The identity assertion method maps a trusted identity (ID) to a WebSphere Application Server credential. This authentication method only includes a user name in the security token. An additional token is included in the message for trust purposes. When the additional token is trusted, the IDAssertion token user name is mapped to a credential.
LTPA
Lightweight Third Party Authentication (LTPA) validates an LTPA token.

JAAS configuration name

[Version 5 only]

Specifies the name of the Java Authentication and Authorization Service (JAAS) configuration.

Callback handler factory class name

[Version 5 only]

Specifies the name of the factory for the CallbackHandler class.




Related concepts
BasicAuth authentication method
Identity assertion authentication method
Signature authentication method
Lightweight Third Party Authentication
Login mappings
Related tasks
Securing Web services for Version 5.x applications using XML digital signature
Related reference
Login mapping configuration settings
Reference topic Reference topic    

Terms and conditions for information centers | Feedback

Last updatedLast updated: Aug 30, 2013 6:03:36 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=pix&product=was-base-iseries&topic=uwbs_logmap
File name: uwbs_logmap.html