際際滷

際際滷Share a Scribd company logo
Developers Let's Try
32 | September 2013
Initial login process
1.	 The browser sends a request to a protected resource for
the first time without an SSO token.
2.	 The agent running on the Web server intercepts the request,
and redirects it to the OpenAM server for authentication.
3. 	 The OpenAM server performs authentication and sends
back the SSO token to the agent.
4.	 The agent validates the token and allows access to the
protected resource, based on the authorisation rules.
Subsequent access
1.	 The browser sends a request to another protected resource
with the SSO token.
2.	 The agent validates the token with the OpenAM server,
O
penAM was originally known as openSSO when
Sun Microsystems owned this open source project.
Once Oracle decided to stop its support for
openSSO, Forgerock (http://forgerock.com/) took over the
code and started supporting it.
OpenAM is very easy to set up and manage. It provides
cross-platform support. It just needs a Tomcat server to
run the OpenAM server. OpenAM provides policy agents,
which run along with the application or Web server. Policy
agents protect the resources on the server based on the
policy defined in the server. OpenAM provides support
for keeping user information in a separate data store
like Active Directory. The key benefit is that you get an
authentication and authorisation system for free.
OpenAM provides a system for integrating diverse Web applicationsto share common
authentication and authorisation systems. It can protect applications running on any
Web or application server.With a centralised login for all applications, users need
to log in only once on the OpenAM server to access any application. OpenAM also
provides URL-based authorisation support on the protected resource.
Setting Up
for Web Authentication
DevelopersLet's Try
September 2013 | 33
Solaris, Windows Server 2003 and Windows 2008 Server.
Agents are available for Tomcat, Weblogic, Jboss, Glassfish
and Oracle Application Server 10g.
Benchmark result
Kiran Ramineni published this benchmark result in the
OpenAM mailing list. (http://lists.forgerock.org/pipermail/
openam/2012-June/006676.html)
# of logins supported in a minute
OpenAM/J2EE container Tomcat JBoss Glassfish
OpenAM 9.5.2 10351 10481 9332
OpenAM 10 15956 15364 13910
Figure 1: SSOInitial Login process
Figure 2: SSOSubsequent access
and will not redirect the user to the login page if the token
is valid and has not expired.
Setting up the OpenAM server
OpenAM server runs under Tomcat as a Web application.
Install Tomcat and download OpenAM_10.0.0.war from
http://forgerock.com/openam.html. Copy OpenAM_10.0.0.war
to the Tomcat Web apps directory. Access the OpenAM server
URL (http://example.OpenAM.com:8080/OpenAM). First
time access will take you to the OpenAM configuration steps.
Configure OpenAM with the default directory server or the
directory server in which you have user information.
Setting up the OpenAM agent
Create an agent profile in the OpenAM server for the agent, and
download the appropriate agent installer from http://forgerock.
com/OpenAM.html. Run the agent installer on the Web server
in which you want to protect the resources. Configure the
agent with the OpenAM server and agent profile details. After
successful installation, a request to the Web server without an
SSO token will be redirected to OpenAM server.
Platforms supported
OpenAM server can be installed on RHEL 4/5/6, Ubuntu,
By: Senthilkumar
The author presently works for LinkedIn. He has more than 10 years
of experience in the open source world. His LinkedIn page is at
http://www.linkedin.com/pub/senthilkumar-e/1/a96/758
[1]	http://forgerock.com/OpenAM.html
[2]	 OpenAM mailing list emails
References
Figure 1-Initial login process
Web or Application
Server
Web or Application Server
OpenAM server
Directory
server
Web user
1
2
Agent Agent
Figure 1-Initial login process
Web or Application ServerWeb or Application
Server
OpenAM server
Directory
server
Web user
1
2
3
4
AgentAgent
1, Vikas Permises, 11 Bank Street,
Fort Mumbai, India-400 001,
09167399917.Mobile:
Email: info@technoinfotech.com
EXCELLENT EMAIL INFRASTRUCTURE SOLUTIONS
WITH UNMATCHED SERVICE SUPPORT!
TechnoMail - Enterprise Email Server Anti SPAM,
Anti Virus, Email Content Filtering
Firewall, Internet Access Control Content Filtering, Site Blocking
Bandwidth Management System
Managed Email Hosting Solutions
Ad

Recommended

IIS Critical Vulnerability 23/12/09
IIS Critical Vulnerability 23/12/09
shlominar
Steps on macfee epo console icon
Steps on macfee epo console icon
Chennam Bhaskar
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
GeoVision : Video Management Solutions : Open Windows Firewall to allow Webca...
TSOLUTIONS
Understanding IIS
Understanding IIS
Om Vikram Thapa
Iis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.com
phanleson
4.0 client server_change_log
4.0 client server_change_log
willyywl
How to Monitor IIS
How to Monitor IIS
Power Admin LLC
Mule fips 140-2 compliance support
Mule fips 140-2 compliance support
D.Rajesh Kumar
IIS 7.0 +
IIS 7.0 +
Muhammad Amir
IIS
IIS
Giritharan V
Cisco wireless lan controller online help
Cisco wireless lan controller online help
Luis Martinez
Shellshock & Poodle Attacks, fix
Shellshock & Poodle Attacks, fix
Sasidhar Gogulapati
VirusScan Enterprise v8.8
VirusScan Enterprise v8.8
Geronimo Martin Alonso
WordPress Security 2018
WordPress Security 2018
Adrian Mikeliunas
Pandora FMS: Exchange OWA Plugin
Pandora FMS: Exchange OWA Plugin
Pandora FMS
Introduction To Iis 7
Introduction To Iis 7
amit_monty
Webinar: 10 Steps To Your Archive!
Webinar: 10 Steps To Your Archive!
GWAVA
Obiee 11g security creating users groups and catalog permissions
Obiee 11g security creating users groups and catalog permissions
Ravi Kumar Lanke
Web server scripting - Security Issues
Web server scripting - Security Issues
John Robinson
Understanding a web server and types of web servers ppt
Understanding a web server and types of web servers ppt
Nivi Sharma
IIS 7: The Administrators Guide
IIS 7: The Administrators Guide
Information Technology
Flows in mule
Flows in mule
Son Nguyen
IdM and AC
IdM and AC
Fernando Lopez Aguilar
CTU June 2011 - Exchange and Lync IM Integration
CTU June 2011 - Exchange and Lync IM Integration
Spiffy
Oracle Hyperion EPM 11.1.2.4 - part 1
Oracle Hyperion EPM 11.1.2.4 - part 1
Alex Liu
SalemPhilip_ResearchReport
SalemPhilip_ResearchReport
Philip Salem
Pandora FMS: Blackberry Exchange Monitoring
Pandora FMS: Blackberry Exchange Monitoring
Pandora FMS
How to authenticate users in your apps using FI-WARE Account - Introduction
How to authenticate users in your apps using FI-WARE Account - Introduction
Javier Cervi単o
Openam misc
Openam misc
Jose R
Securing web applications
Securing web applications
Supreme O

More Related Content

What's hot (20)

IIS 7.0 +
IIS 7.0 +
Muhammad Amir
IIS
IIS
Giritharan V
Cisco wireless lan controller online help
Cisco wireless lan controller online help
Luis Martinez
Shellshock & Poodle Attacks, fix
Shellshock & Poodle Attacks, fix
Sasidhar Gogulapati
VirusScan Enterprise v8.8
VirusScan Enterprise v8.8
Geronimo Martin Alonso
WordPress Security 2018
WordPress Security 2018
Adrian Mikeliunas
Pandora FMS: Exchange OWA Plugin
Pandora FMS: Exchange OWA Plugin
Pandora FMS
Introduction To Iis 7
Introduction To Iis 7
amit_monty
Webinar: 10 Steps To Your Archive!
Webinar: 10 Steps To Your Archive!
GWAVA
Obiee 11g security creating users groups and catalog permissions
Obiee 11g security creating users groups and catalog permissions
Ravi Kumar Lanke
Web server scripting - Security Issues
Web server scripting - Security Issues
John Robinson
Understanding a web server and types of web servers ppt
Understanding a web server and types of web servers ppt
Nivi Sharma
IIS 7: The Administrators Guide
IIS 7: The Administrators Guide
Information Technology
Flows in mule
Flows in mule
Son Nguyen
IdM and AC
IdM and AC
Fernando Lopez Aguilar
CTU June 2011 - Exchange and Lync IM Integration
CTU June 2011 - Exchange and Lync IM Integration
Spiffy
Oracle Hyperion EPM 11.1.2.4 - part 1
Oracle Hyperion EPM 11.1.2.4 - part 1
Alex Liu
SalemPhilip_ResearchReport
SalemPhilip_ResearchReport
Philip Salem
Pandora FMS: Blackberry Exchange Monitoring
Pandora FMS: Blackberry Exchange Monitoring
Pandora FMS
How to authenticate users in your apps using FI-WARE Account - Introduction
How to authenticate users in your apps using FI-WARE Account - Introduction
Javier Cervi単o
Cisco wireless lan controller online help
Cisco wireless lan controller online help
Luis Martinez
Shellshock & Poodle Attacks, fix
Shellshock & Poodle Attacks, fix
Sasidhar Gogulapati
Pandora FMS: Exchange OWA Plugin
Pandora FMS: Exchange OWA Plugin
Pandora FMS
Introduction To Iis 7
Introduction To Iis 7
amit_monty
Webinar: 10 Steps To Your Archive!
Webinar: 10 Steps To Your Archive!
GWAVA
Obiee 11g security creating users groups and catalog permissions
Obiee 11g security creating users groups and catalog permissions
Ravi Kumar Lanke
Web server scripting - Security Issues
Web server scripting - Security Issues
John Robinson
Understanding a web server and types of web servers ppt
Understanding a web server and types of web servers ppt
Nivi Sharma
Flows in mule
Flows in mule
Son Nguyen
CTU June 2011 - Exchange and Lync IM Integration
CTU June 2011 - Exchange and Lync IM Integration
Spiffy
Oracle Hyperion EPM 11.1.2.4 - part 1
Oracle Hyperion EPM 11.1.2.4 - part 1
Alex Liu
SalemPhilip_ResearchReport
SalemPhilip_ResearchReport
Philip Salem
Pandora FMS: Blackberry Exchange Monitoring
Pandora FMS: Blackberry Exchange Monitoring
Pandora FMS
How to authenticate users in your apps using FI-WARE Account - Introduction
How to authenticate users in your apps using FI-WARE Account - Introduction
Javier Cervi単o

Similar to Setting up OpenAM for web authentication (15)

Openam misc
Openam misc
Jose R
Securing web applications
Securing web applications
Supreme O
OpenAM - An Introduction
OpenAM - An Introduction
ForgeRock
FOSSwire3 + OpenID
FOSSwire3 + OpenID
cvanp
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
ForgeRock
Integrating open am with liferay portal
Integrating open am with liferay portal
prabakaranbrick
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO
elliando dias
Sso & rman
Sso & rman
vishaalkumar11
OpenAM Survival Tips
OpenAM Survival Tips
ForgeRock
Benefits of Using Open Source IAM
Benefits of Using Open Source IAM
WSO2
Open sso enterprise customer pitch
Open sso enterprise customer pitch
xKinAnx
Openid Presentation - A Quick Introduction
Openid Presentation - A Quick Introduction
Corsin Camichel
CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
pgmaynard
Lecture 20101124
Lecture 20101124
Anderson Liang
Webinar: OpenAM 12.0 - New Featurs
Webinar: OpenAM 12.0 - New Featurs
ForgeRock
Openam misc
Openam misc
Jose R
Securing web applications
Securing web applications
Supreme O
OpenAM - An Introduction
OpenAM - An Introduction
ForgeRock
FOSSwire3 + OpenID
FOSSwire3 + OpenID
cvanp
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
ForgeRock
Integrating open am with liferay portal
Integrating open am with liferay portal
prabakaranbrick
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO
elliando dias
OpenAM Survival Tips
OpenAM Survival Tips
ForgeRock
Benefits of Using Open Source IAM
Benefits of Using Open Source IAM
WSO2
Open sso enterprise customer pitch
Open sso enterprise customer pitch
xKinAnx
Openid Presentation - A Quick Introduction
Openid Presentation - A Quick Introduction
Corsin Camichel
CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
pgmaynard
Webinar: OpenAM 12.0 - New Featurs
Webinar: OpenAM 12.0 - New Featurs
ForgeRock
Ad

Setting up OpenAM for web authentication

  • 1. Developers Let's Try 32 | September 2013 Initial login process 1. The browser sends a request to a protected resource for the first time without an SSO token. 2. The agent running on the Web server intercepts the request, and redirects it to the OpenAM server for authentication. 3. The OpenAM server performs authentication and sends back the SSO token to the agent. 4. The agent validates the token and allows access to the protected resource, based on the authorisation rules. Subsequent access 1. The browser sends a request to another protected resource with the SSO token. 2. The agent validates the token with the OpenAM server, O penAM was originally known as openSSO when Sun Microsystems owned this open source project. Once Oracle decided to stop its support for openSSO, Forgerock (http://forgerock.com/) took over the code and started supporting it. OpenAM is very easy to set up and manage. It provides cross-platform support. It just needs a Tomcat server to run the OpenAM server. OpenAM provides policy agents, which run along with the application or Web server. Policy agents protect the resources on the server based on the policy defined in the server. OpenAM provides support for keeping user information in a separate data store like Active Directory. The key benefit is that you get an authentication and authorisation system for free. OpenAM provides a system for integrating diverse Web applicationsto share common authentication and authorisation systems. It can protect applications running on any Web or application server.With a centralised login for all applications, users need to log in only once on the OpenAM server to access any application. OpenAM also provides URL-based authorisation support on the protected resource. Setting Up for Web Authentication
  • 2. DevelopersLet's Try September 2013 | 33 Solaris, Windows Server 2003 and Windows 2008 Server. Agents are available for Tomcat, Weblogic, Jboss, Glassfish and Oracle Application Server 10g. Benchmark result Kiran Ramineni published this benchmark result in the OpenAM mailing list. (http://lists.forgerock.org/pipermail/ openam/2012-June/006676.html) # of logins supported in a minute OpenAM/J2EE container Tomcat JBoss Glassfish OpenAM 9.5.2 10351 10481 9332 OpenAM 10 15956 15364 13910 Figure 1: SSOInitial Login process Figure 2: SSOSubsequent access and will not redirect the user to the login page if the token is valid and has not expired. Setting up the OpenAM server OpenAM server runs under Tomcat as a Web application. Install Tomcat and download OpenAM_10.0.0.war from http://forgerock.com/openam.html. Copy OpenAM_10.0.0.war to the Tomcat Web apps directory. Access the OpenAM server URL (http://example.OpenAM.com:8080/OpenAM). First time access will take you to the OpenAM configuration steps. Configure OpenAM with the default directory server or the directory server in which you have user information. Setting up the OpenAM agent Create an agent profile in the OpenAM server for the agent, and download the appropriate agent installer from http://forgerock. com/OpenAM.html. Run the agent installer on the Web server in which you want to protect the resources. Configure the agent with the OpenAM server and agent profile details. After successful installation, a request to the Web server without an SSO token will be redirected to OpenAM server. Platforms supported OpenAM server can be installed on RHEL 4/5/6, Ubuntu, By: Senthilkumar The author presently works for LinkedIn. He has more than 10 years of experience in the open source world. His LinkedIn page is at http://www.linkedin.com/pub/senthilkumar-e/1/a96/758 [1] http://forgerock.com/OpenAM.html [2] OpenAM mailing list emails References Figure 1-Initial login process Web or Application Server Web or Application Server OpenAM server Directory server Web user 1 2 Agent Agent Figure 1-Initial login process Web or Application ServerWeb or Application Server OpenAM server Directory server Web user 1 2 3 4 AgentAgent 1, Vikas Permises, 11 Bank Street, Fort Mumbai, India-400 001, 09167399917.Mobile: Email: info@technoinfotech.com EXCELLENT EMAIL INFRASTRUCTURE SOLUTIONS WITH UNMATCHED SERVICE SUPPORT! TechnoMail - Enterprise Email Server Anti SPAM, Anti Virus, Email Content Filtering Firewall, Internet Access Control Content Filtering, Site Blocking Bandwidth Management System Managed Email Hosting Solutions