IBM Security Access Manager Version 9.0.7 June 2019: Advanced Access Control Configuration Topics Contents
Total Page:16
File Type:pdf, Size:1020Kb
IBM Security Access Manager Version 9.0.7 June 2019 Advanced Access Control Configuration topics IBM IBM Security Access Manager Version 9.0.7 June 2019 Advanced Access Control Configuration topics IBM ii IBM Security Access Manager Version 9.0.7 June 2019: Advanced Access Control Configuration topics Contents Figures .............. vii Configuring authentication ........ 39 Configuring an HOTP one-time password Tables ............... ix mechanism .............. 40 Configuring a TOTP one-time password mechanism 42 Configuring a MAC one-time password mechanism 45 Chapter 1. Upgrading configuration ... 1 Configuring an RSA one-time password mechanism 46 Upgrading external databases with the dbupdate tool Configuring one-time password delivery methods 50 (for appliance at version 9.0.0.0 and later) .... 2 Configuring username and password authentication 54 Upgrading a SolidDB external database (for Configuring an HTTP redirect authentication appliance versions earlier than 9.0.0.0) ...... 3 mechanism .............. 56 Upgrading a DB2 external runtime database (for Configuring consent to device registration .... 57 appliance versions earlier than 9.0.0.0) ...... 4 Configuring an End-User License Agreement Upgrading an Oracle external runtime database (for authentication mechanism ......... 59 appliance versions earlier than 9.0.0.0) ...... 5 Configuring an Email Message mechanism .... 60 Setting backward compatibility mode for one-time HTML format for OTP email messages .... 62 password ............... 6 Configuring the reCAPTCHA Verification Updating template files ........... 6 authentication mechanism ......... 62 Updating PreTokenGeneration to limit OAuth tokens 7 Configuring an Info Map authentication mechanism 64 Reviewing existing Web Reverse Proxy instance point Embedding reCAPTCHA verification in an Info of contact settings ............ 8 Map mechanism ............ 66 Upgrading the signing algorithms of existing policy Available parameters in Info Map ...... 66 servers ................ 9 Embedded Cloud Identity API calls in an Info Map mechanism ............ 67 Chapter 2. Getting started with Configuring a Knowledge Questions authentication Advanced Access Control ...... 13 mechanism .............. 68 Configuring a FIDO Universal 2nd Factor Chapter 3. Managing application authentication mechanism ......... 71 interfaces ............. 15 Configuring a FIDO2/WebAuthn authentication mechanism .............. 73 Configuring a QR Code authentication mechanism 74 Chapter 4. Managing the runtime Enabling or disabling authentication policies ... 75 component ............. 17 Managing mapping rules .......... 75 Authentication Service Credential mapping rule 77 Chapter 5. Managing user registries .. 19 OTPGetMethods mapping rule ....... 78 OTPGenerate mapping rule ........ 79 Chapter 6. Runtime security services OTPDeliver mapping rule ........ 79 OTPVerify mapping rule ......... 80 external authorization service ..... 21 Customizing one-time password mapping rules Configuring runtime security services for client to use access control context data ...... 81 certificate authentication .......... 21 One-time password and authentication template Permitting access decisions when runtime security files ................. 83 services cannot be contacted ......... 23 Push notification registration ........ 83 Retaining the version 7.0 attribute IDs in existing Obtaining the required authentication credentials policies ................ 24 to configure push notification for IBM Verify .. 84 Cloud Identity API Integration ........ 85 Chapter 7. Adding runtime listening Cloud Identity JavaScript ......... 86 interfaces ............. 25 Authentication flow .......... 86 User Self Care flow ........... 87 Chapter 8. Support for compliance with Configuring the authentication and access module for cookieless operation .......... 88 NIST SP800-131a .......... 27 Reverse Proxy Configuration with Authentication Services ............... 89 Chapter 9. Authentication....... 31 Configuring advanced access control Authentication Service configuration overview .. 35 authentication on a reverse proxy ...... 89 Authentication configuration scenarios ..... 37 Using the isamcfg tool.......... 90 Configuring step-up authentication ..... 37 iii Chapter 10. OAuth 2.0 and OIDC OAuth STS Interface for Authorization support .............. 105 Enforcement Points ........... 173 OAuth and OpenID Connect concepts ..... 105 API Protection form post response mode .... 180 OAuth 2.0 concepts .......... 105 Access policy for OAuth or OIDC ...... 181 OpenID Connect concepts ........ 106 Making an OAuth or OIDC consent decision OAuth 2.0 endpoints ........... 108 using access policy .......... 181 OAuth 2.0 and OIDC workflows ....... 111 OIDC Dynamic Clients .......... 182 Client authentication considerations at the OIDC Dynamic Clients- Authentication and OAuth 2.0 token endpoint ........ 120 deployment ............. 182 Configuring an authenticated token endpoint OIDC Dynamic Clients- Register a client ... 183 with WebSEAL as the point of contact .... 121 OIDC Dynamic Clients- Retrieve a dynamic State management ............ 122 client ............... 183 Trusted clients management ........ 123 OIDC Dynamic Clients- Custom Identifiers .. 184 Proof Key for Code Exchange support ..... 124 OIDC Dynamic Clients- Update a client ... 184 Reverse proxy configuration for OAuth and OIDC OIDC Dynamic Clients- Delete a client .... 185 provider ............... 125 Configuring a reverse proxy for OAuth and an Chapter 11. Mobile Multi-Factor OIDC Connect provider ......... 125 Authentication ........... 187 Viewing a reverse proxy log for an automated Authenticator registration ......... 187 configuration ............ 127 Authentication method enrollment ...... 188 Example reverse proxy log for OAuth and Configuring Mobile Multi-Factor Authentication 188 OIDC configuration .......... 128 Configuring a Mobile Multi-Factor Authentication Removing reverse proxy configuration for (MMFA) Authenticator Mechanism ...... 189 OAuth and OIDC provider ........ 130 MMFA mapping rule methods........ 190 Configuring API protection......... 131 Creating an API protection definition .... 131 Chapter 12. FIDO and WebAuthn Managing API protection definitions .... 132 Support .............. 193 API Protection token management properties 133 FIDO2 Server Endpoints.......... 193 API Protection OpenID Connect Provider Concepts ............... 193 properties ............. 135 WebAuthn Ceremonies ......... 194 PIN policy ............. 137 Attestation ............. 195 Registering an API protection client ..... 137 Public Key Algorithms ......... 197 Managing registered API protection clients .. 139 Metadata .............. 197 Managing policy attachments ....... 140 Registration .............. 197 Using oauthScope attributes in an access control U2F Migration ............. 199 policy ............... 143 FIDO2 Configuration ........... 199 Uploading OAuth response files ...... 144 Create a FIDO2 Relying Party ....... 199 OAuth introspection .......... 144 Authentication Service Mechanism ...... 201 OAuth revocation endpoint........ 146 Limitations .............. 202 OIDC Claims customization ........ 147 FIDO2 Mediation ............ 202 Client authentication to /token through an incoming JSON Web Token ......... 153 Passing parameters through JWT in a request to Chapter 13. Access control policies 205 /authorize .............. 154 Defining a custom application for policy Mapping rules for OAuth and OIDC ..... 156 attachments .............. 205 Managing OAuth 2.0 and OIDC mapping rules 156 Invoking the RTSS XACML engine ...... 206 OAuth 2.0 and OIDC mapping rule methods 157 ContextId JSON example ........ 206 OAuth and OIDC mapping rules files .... 157 ApplicationId JSON example ....... 207 OAuth and OIDC mapping rules actions ... 158 resource-id JSON example ........ 208 Customizing OAuth tokens by updating the sample PreTokenGeneration mapping rule... 163 Chapter 14. Defining a custom domain OpenID Connect mapping rules ...... 164 for policy attachments ....... 211 Device flows verification uri ....... 166 OAuth 2.0 template files.......... 166 Chapter 15. Deploying pending OAuth 2.0 template page for consent to authorize 167 Error responses............. 170 changes ............. 213 User self-administration tasks for OAuth .... 170 Managing OAuth 2.0 authorization grants ... 170 Chapter 16. Options for handling APIs for managing OAuth 2.0 authorization session failover events ....... 215 grants ............... 171 Option 1: No handling of failover events .... 215 iv IBM Security Access Manager Version 9.0.7 June 2019: Advanced Access Control Configuration topics Option 2: The distributed session cache..... 215 Customizing SAML 2.0 identity mapping ... 301 STSRequest and STSResponse access using a Chapter 17. Global settings ..... 217 JavaScript mapping rule ......... 303 Managing advanced configuration ...... 218 OpenID Connect mapping rules ...... 310 Advanced configuration properties ..... 219 Import a mapping rule from another mapping Managing user registries ......... 242 rule................ 311 Tuning runtime application parameters and tracing Auditing from Mapping Rules....... 312 specifications ............. 243 Managing Distributed Session Cache ..... 315 Template files ............. 249 Managing server connections ........ 315 Managing template files ......... 249 Server connection properties ....... 317 Customizing the consent page ....... 251 Point of contact profiles .......... 320 Template