Verifyaccess Admin
Verifyaccess Admin
Version 10.0.1
December 2020
Administration topics
IBM
DRAFT - NOT FOR PUBLICATION
DRAFT - NOT FOR PUBLICATION
Contents
Figures................................................................................................................. ix
Tables.................................................................................................................. xi
Chapter 1. Overview.............................................................................................. 1
Activation level overview.............................................................................................................................1
Tips on using the appliance........................................................................................................................ 3
Chapter 2. Getting Started.....................................................................................5
Hardware appliance tasks...........................................................................................................................5
Connecting cables and starting the appliance..................................................................................... 5
Options to configure the hardware appliance...................................................................................... 5
Connecting a serial console to the appliance.......................................................................................5
Determining the system IP address......................................................................................................6
Virtual appliance tasks................................................................................................................................ 6
Setting up the virtual network...............................................................................................................6
Installing the virtual appliance by using VMware................................................................................ 7
Installing the virtual appliance by using the OVA file.......................................................................... 8
Installing the virtual appliance by using the vSphere API................................................................... 8
Installing the virtual appliance by using KVM...................................................................................... 9
Installing the virtual appliance by using Red Hat Enterprise Virtualization (RHEV)..........................10
Installing the virtual appliance by using Microsoft Hyper-V..............................................................11
XenServer support............................................................................................................................... 11
Amazon EC2 support........................................................................................................................... 14
Microsoft Azure support...................................................................................................................... 17
Calculating license usage.................................................................................................................... 22
Setting up Cloud Orchestrator support...............................................................................................22
USB support on virtual appliances..................................................................................................... 24
Common tasks........................................................................................................................................... 24
Command-line interface initial appliance settings wizard.................................................................24
IBM Security Verify Access Appliance setup wizard by using the local management interface....... 25
Activating the product and buying support........................................................................................ 26
Silent configuration.............................................................................................................................. 27
Chapter 3. Initial configuration............................................................................ 31
iii
DRAFT - NOT FOR PUBLICATION
Chapter 6. Monitoring.......................................................................................... 45
Viewing the event log................................................................................................................................45
Forwarding logs to a remote syslog server..............................................................................................45
Viewing memory statistics........................................................................................................................ 46
Viewing CPU utilization............................................................................................................................. 47
Viewing storage utilization........................................................................................................................ 47
Viewing application interface statistics....................................................................................................48
Viewing application log files..................................................................................................................... 49
Managing tracing specification................................................................................................................. 50
Chapter 7. System............................................................................................... 53
Updates and licensing...............................................................................................................................53
Viewing the update and licensing overview....................................................................................... 53
Installing updates................................................................................................................................ 53
Configuring the update schedule........................................................................................................ 54
Configuring update server settings..................................................................................................... 54
Viewing update history........................................................................................................................ 56
Installing a fix pack............................................................................................................................. 56
Installing a license...............................................................................................................................57
Managing firmware settings................................................................................................................ 57
Managing trial settings........................................................................................................................ 58
Installing an extension........................................................................................................................ 58
Network Settings....................................................................................................................................... 59
Configuring general networking settings............................................................................................ 59
Configuring DNS................................................................................................................................... 59
Configuring interfaces..........................................................................................................................60
Appliance port usage...........................................................................................................................62
Configuring aggregated network interfaces........................................................................................65
Configuring static routes..................................................................................................................... 66
Testing the connection........................................................................................................................ 67
Managing hosts file.............................................................................................................................. 68
Managing the shared volume.............................................................................................................. 69
Managing packet tracing......................................................................................................................70
Creating a cluster.................................................................................................................................71
Managing cluster configuration........................................................................................................... 72
Managing Distributed Session Cache in Docker................................................................................. 89
Managing database configuration in Docker...................................................................................... 90
System settings......................................................................................................................................... 92
Configuring date and time settings.....................................................................................................92
Configuring administrator settings......................................................................................................92
Configuring tracing for the local management interface................................................................... 93
Configuring management authentication............................................................................................95
Managing roles of users and groups...................................................................................................97
Viewing and updating management SSL certificates.......................................................................100
Managing users and groups.............................................................................................................. 100
Managing advanced tuning parameters........................................................................................... 101
Managing snapshots.......................................................................................................................... 105
Managing support files...................................................................................................................... 106
Configuring system alerts..................................................................................................................106
Restarting or shutting down the appliance...................................................................................... 110
Configuring application database settings....................................................................................... 110
Setting the locale of application log files......................................................................................... 112
iv
DRAFT - NOT FOR PUBLICATION
Chapter 9. Deployment methodologies...............................................................157
Cluster support........................................................................................................................................157
Cluster support overview.................................................................................................................. 157
Roles and services in a cluster......................................................................................................... 157
Data replication in a cluster..............................................................................................................159
High availability of cluster services.................................................................................................. 160
High availability for the policy server............................................................................................... 162
Cluster failure management..............................................................................................................164
Promoting a node to master............................................................................................................. 164
Removing an unreachable master node from a cluster...................................................................166
Restricted nodes in a cluster............................................................................................................ 167
Cluster maintenance..........................................................................................................................167
Cluster configuration rules................................................................................................................ 168
Data loss considerations................................................................................................................... 170
Deployment pattern...........................................................................................................................171
Cluster-less AAC Deployment................................................................................................................ 172
AAC Specific Configuration................................................................................................................174
FIDO2 Specific Configuration............................................................................................................174
Federation Specific Configuration.....................................................................................................174
Limitations..........................................................................................................................................175
Chapter 11. Migration........................................................................................ 179
Migrating an existing WebSEAL instance to the appliance....................................................................179
Migrating an existing Access Manager software environment to the appliance................................... 182
v
DRAFT - NOT FOR PUBLICATION
Chapter 17. Junctions........................................................................................233
Creating virtual junctions........................................................................................................................ 233
Creating standard junctions....................................................................................................................234
Managing standard and virtual junctions...............................................................................................236
Chapter 19. Authorization servers......................................................................241
Cleaning up authorization servers..........................................................................................................241
Creating an authorization server instance............................................................................................. 241
Deleting an authorization server instance............................................................................................. 242
Stopping, starting, or restarting an authorization server instance........................................................243
Editing an authorization server instance advanced configuration file.................................................. 243
Editing an authorization server instance tracing configuration file.......................................................243
Renewing authorization server management certificates..................................................................... 244
Chapter 20. Clusters.......................................................................................... 245
vi
DRAFT - NOT FOR PUBLICATION
Chapter 22. Global settings................................................................................249
Managing dynamic URL configuration files............................................................................................ 249
Managing junction mapping JMT configuration files............................................................................. 251
Managing client certificate CDAS files................................................................................................... 252
Managing user mapping CDAS files....................................................................................................... 254
Managing password strength rule files.................................................................................................. 255
Managing forms based single sign-on files............................................................................................256
Managing HTTP transformation files......................................................................................................258
Managing RSA SecurID configuration.................................................................................................... 259
Managing the Redis configuration.......................................................................................................... 259
Chapter 23. Global keys.....................................................................................263
Managing SSO keys................................................................................................................................. 263
Managing LTPA keys................................................................................................................................263
Kerberos configuration............................................................................................................................264
Managing the default values used by Kerberos............................................................................... 265
Managing realms................................................................................................................................266
Managing domain realm properties..................................................................................................267
Managing CA paths............................................................................................................................ 268
Managing keytab files........................................................................................................................269
Chapter 25. Logging........................................................................................... 275
Listing the names of all log files and file sizes...................................................................................... 275
Viewing a snippet of or export a log file................................................................................................ 275
Clearing a log file.................................................................................................................................... 276
Managing transaction logging components and data files.................................................................... 276
Managing reverse proxy log files............................................................................................................277
Managing authorization server log files................................................................................................. 278
vii
DRAFT - NOT FOR PUBLICATION
Index................................................................................................................ 325
viii
DRAFT - NOT FOR PUBLICATION
Figures
1. Product activation levels for the IBM Security Verify Access product....................................................... 3
2. Services architecture................................................................................................................................158
ix
DRAFT - NOT FOR PUBLICATION
x
DRAFT - NOT FOR PUBLICATION
Tables
1. Valid keys.................................................................................................................................................... 29
5. Bonding modes...........................................................................................................................................65
19. Example commands for some common Docker Compose tasks......................................................... 155
21. WebSEAL features that the appliance does not support..................................................................... 177
xi
DRAFT - NOT FOR PUBLICATION
24...................................................................................................................................................................203
xii
DRAFT - NOT FOR PUBLICATION
Chapter 1. Overview
The IBM Security Verify Access Appliance is a network appliance-based security solution that provides
both access control and protection from web-based threats.
The main features of the appliance include:
• A dashboard for viewing system status such as system notifications and disk usage.
• Analysis and diagnostics tools such as event logs, memory statistics, and CPU utilization.
• Centralized management of settings such as runtime components configuration files, and SSL
certificates.
• Control of system settings such as updates, licenses, and network settings.
Most of the features are configurable by using the local management interface (LMI).
The hardware appliance consists of the hardware and preinstalled IBM Security Verify Access Appliance
firmware. The preinstalled firmware software can also be obtained separately as a virtual appliance image
that you can deploy in a hypervisor environment.
For information about specifications for both the hardware appliance and virtual appliance, see System
Requirements.
2 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Figure 1. Product activation levels for the IBM Security Verify Access product
Backup
It is important to back up your appliance frequently. To back up the appliance, use the snapshot facility
that is provided by the appliance.
A snapshot is a copy of the state of the appliance at a certain time. By using snapshot files, you can back
up your appliance and restore the appliance later. It is a good practice to take snapshots regularly and
download them from the appliance to serve as backups. However, snapshots can consume much disk
space and as such it is best to clean up the old snapshots regularly.
For details about working with snapshots, see “Managing snapshots” on page 105.
Chapter 1. Overview 3
DRAFT - NOT FOR PUBLICATION
Session timeouts
Save your configuration updates in the local management interface (LMI) regularly to avoid any data loss
in the event of a session timeout.
LMI sessions expire after the duration of time that is specified by the Session Timeout field on the
Administrator Settings page. When a session timeout occurs, any unsaved data on the current page is
lost.
The administrator must monitor the remaining free disk space, and take the necessary actions to
ensure that there is adequate disk space. The appliance provides a Disk Usage dashboard widget for
administrators to monitor the current disk usage. For more information about managing disk space, see
“Viewing disk usage” on page 41.
4 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Connect the power cable to the appliance.
2. Connect Management Interface 1 to the network you want to use to manage the appliance.
3. Connect the network cables to the application interfaces.
4. Turn on the appliance.
Procedure
1. Connect the console device to the hardware appliance with a serial cable.
Note: Your appliance package might contain a USB serial console cable and a DB-9 serial console
cable, or the package might contain only a DB-9 serial console cable. If you use the USB serial console
cable and your PC does not recognize the cable, you might need to install the device driver.
The device drivers are available for download from http://public.dhe.ibm.com/software/security/
products/infrastructure_protection/USBDeviceDrivers or from the driver supplier at http://
www.prolific.com.tw/US/ShowProduct.aspx?p_id=225&pcid=41.
DRAFT - NOT FOR PUBLICATION
2. If you use a computer as the console device, connect to the appliance with Microsoft Hyperterminal or
another terminal emulation program by using the following settings:
Option Description
Communication Port Typically COM1
Emulation VT100
Bits per second 9600
Data bits 8
Parity None
Stop bits 1
Flow control None
3. Follow the instructions in “Common tasks” on page 24 to configure initial appliance settings.
6 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Create a new virtual machine with your VMware ESX or vSphere.
Note:
• The instructions for creating a virtual machine might differ depending on your VMware ESX or
vSphere version. See the VMware documentation that suits your version for specific instructions.
• Ensure that the virtual machine has enough allocated disk space to store the configuration and log
file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
• Specify Virtual Machine Version 7 or later as your virtual machine version.
• Specify Linux as the guest operating system and Other 3.x Linux (64-bit) as the guest operating
system version.
• The memory size has influence over how many WebSEAL instances can be created and how many
sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
• Each network adapter must be of the type E1000 or VMXNET 3. Use VMXNET 3 for better
performance.
• For SCSI controller, select LSI Logic Parallel.
• For Virtual Device Node, select SCSI (0:0).
• Diskette, COM ports, and LPT port must be enabled in the BIOS settings of the VM.
• VMware Tools on the appliance provide the following enhancements:
– VMware commands for graceful shutdown
– Improved monitoring
– Time synchronization with the host operating system unless an NTP server is configured
2. Configure the virtual machine to boot from the .iso file and then start the virtual machine.
Note: If the hard disk that is attached to the virtual machine already contains a Linux partition, the
installer always runs in interactive mode.
• To run the installer in silent mode, wait 10 seconds or press Enter. After the silent installation
completes, the virtual machine is shut down automatically. If you want to continue with setting up
the appliance, restart the virtual machine.
• To run the installer in interactive mode, enter interactive and then press Enter.
a. Enter YES to proceed with the installation. Alternatively if you do not want to proceed with the
installation, enter NO to move to the reboot prompt.
b. Examine the installation messages to ensure that the installation was successful. After the
installation process is complete, unmount the installation media and then press Enter to reboot
the appliance.
3. When the reboot operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
Procedure
1. Import the provided OVA file into VMware.
Note: The instructions for importing an OVA file might differ depending on your VMware product
version. See the VMware documentation that suits your version for specific instructions.
2. Start the virtual machine.
3. When the reboot operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
Procedure
1. In the local management interface of the appliance, select System > Secure Settings > File
Downloads.
2. Expand Common > Sample > Deploy.
3. Select the deploy_isva_to_vsphere.py file.
4. Click Export to save the file to your local drive.
8 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
5. Examine the script to determine the steps to deploy and run the virtual appliance. Help on the script
can be obtained by running the following command:
Note:
• Supported Python versions are 2.7 and 3.4.
• In Python versions 2.7.9, 3.4.3, or later, unverified SSL connections are disabled. Ensure that the
vSphere server certificate is present in the keystore that Python uses.
• Supported vSphere versions are 4.1, 5.0, 5.1, and 5.5.
• The pyVmomi library is required. It can be installed from the pip tool or from https://github.com/
vmware/pyvmomi.
• To run the script, you must have the genisoimage or mkisofs tools in your path.
6. Modify the script as needed.
Procedure
1. Create a new virtual machine.
Note:
• The instructions for creating a virtual machine might differ based on the utility that you are using
to manage your virtual machines. See the KVM documentation that suits your version for specific
instructions.
• Ensure that the virtual machine has enough disk space that is allocated to store the configuration
and log file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
• The memory size has influence over how many WebSEAL instances can be created and how many
sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
• Each network adapter must be of the type E1000 or Virtio. Use Virtio for better performance.
• The hard disk drive must be configured as a Virtio disk device.
• If you use certain versions of the Virtual Machine Manager (virt-manager) software to create your
virtual machines, it might by default add some CPU definitions that are incompatible with the
appliance and thus cause deployment errors. To fix this issue, you can use one of the following
methods:
– From the Virtual Machine Manager console, open the VM definition. Go to Processor. Expand the
Configuration option and then change the value of the Model field to Clear CPU configuration.
Click Apply.
– From the virsh shell, edit the virtual machine definition (for example, edit isva_appliance).
Locate and then remove the <cpu>...</cpu> entry. Save the file.
2. Configure the virtual machine to start from the .iso file and then start the virtual machine.
• To run the installer in silent mode, wait 10 seconds or press Enter. After the silent installation
completes, the virtual machine is shut down automatically. If you want to continue with setting up
the appliance, restart the virtual machine.
• To run the installer in interactive mode, enter interactive and then press Enter.
Note: If the hard disk that is attached to the virtual machine already contains a Linux partition, the
installer always runs in interactive mode.
a. Enter YES to proceed with the installation. Alternatively if you do not want to proceed with the
installation, enter NO to move to the reboot prompt.
b. Examine the installation messages to ensure that the installation was successful. After the
installation process is complete, unmount the installation media and then press Enter to reboot
the appliance.
3. When the restart operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
Procedure
1. Create a new virtual machine.
Note:
• Ensure that the virtual machine has enough disk space that is allocated to store the configuration
and log file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
• The memory size has influence over how many Web Reverse Proxy instances can be created and how
many sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
• Each network adapter must be of the type E1000 or Virtio. Use Virtio for better performance.
• The hard disk drive must be configured as a Virtio disk device.
2. Configure the virtual machine to start from the .iso file and then start the virtual machine.
• To run the installer in silent mode, wait 10 seconds or press Enter. After the silent installation
completes, the virtual machine is shut down automatically. If you want to continue with setting up
the appliance, restart the virtual machine.
• To run the installer in interactive mode, enter interactive and then press Enter.
Note: If the hard disk that is attached to the virtual machine already contains a Linux partition, the
installer always runs in interactive mode.
a. Enter YES to proceed with the installation. Alternatively if you do not want to proceed with the
installation, enter NO to move to the reboot prompt.
b. Examine the installation messages to ensure that the installation was successful. After the
installation process is complete, unmount the installation media and then press Enter to reboot
the appliance.
3. When the restart operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
10 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Create a new virtual machine with Microsoft Hyper-V.
Note:
• The instructions for creating a virtual machine might differ depending on your Windows version. See
the Hyper-V documentation that suits your version for specific instructions.
• Ensure that the virtual machine has enough allocated disk space to store the configuration and log
file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
• Specify Generation 1 as the virtual machine generation. The virtual appliance must be run as
Generation 1 virtual machine, Generation 2 virtual machines are not supported.
• The memory size has influence over how many Web Reverse Proxy instances can be created and how
many sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
• Each network adapter must be of the type Network Adapter. The Legacy Network Adapter type is
not supported.
• The Hard Drive and DVD Drive must be attached to IDE Controller 0 and IDE Controller 1,
respectively.
• The following Integration Services are supported:
– Operating system shutdown
– Time synchronization
– Heartbeat
2. Configure the virtual machine to boot from the .iso file and then start the virtual machine.
Note: If the hard disk that is attached to the virtual machine already contains a Linux partition, the
installer always runs in interactive mode.
• To run the installer in silent mode, wait 10 seconds or press Enter. After the silent installation
completes, the virtual machine is shut down automatically. If you want to continue with setting up
the appliance, restart the virtual machine.
• To run the installer in interactive mode, enter interactive and then press Enter.
a. Enter YES to proceed with the installation. Alternatively if you do not want to proceed with the
installation, enter NO to move to the reboot prompt.
b. Examine the installation messages to ensure that the installation was successful. After the
installation process is complete, unmount the installation media and then press Enter to reboot
the appliance.
3. When the reboot operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
XenServer support
The Security Verify Access appliance can be installed on a XenServer hypervisor (version 6.2 and later).
The Security Verify Access appliance for XenServer is distributed as a pre-installed disk image of the
appliance in Virtual Hard Disk (VHD) format. The disk has a fixed size of 100 GB. It is recommended to
enable off-the-box logging and auditing to ensure that the disk is not consumed with log files. You can
also use the standard installation ISO images to install the virtual appliance on XenServer.
To deploy the VHD appliance image to XenServer, you can use either of the following methods:
Procedure
1. In the XenCenter console, expand the XenCenter icon on the left.
2. Right-click the attached hypervisor and select Import.
3. In the Import Source window:
a) Click Browse.
b) Select the VHD image to be imported and click Open.
c) Click Next.
4. In the VM Definition window:
a) Specify the name, number of CPUs, and memory of the virtual machine.
Note: In most scenarios, assign the virtual machine at least one processor and 2 GB of memory.
These settings can be adjusted after the virtual machine starts running.
b) Click Next.
5. In the Location window:
a) Select the destination hypervisor from the drop-down list on the right.
b) Click Next.
6. In the Storage window:
a) Select Place imported virtual disks onto specified target SRs.
b) Click Next.
7. In the Networking window:
a) Select the network to be used for the first management interface.
b) Click Next.
8. In the OS Fixup Settings window:
a) Select Don't use Operating System Fixup.
b) Click Next.
9. In the Transfer VM Settings window:
a) Specify the settings to suit your network environment.
Note: If DHCP is not available in the network, a valid IP address, subnet, and gateway must be
specified
b) Click Next.
10. In the Finish window, click Finish to start the import.
Note: The import operation might take a considerable amount of time to complete. You can click the
Logs tab to check the progress of the import.
12 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Create a new virtual machine with XenCenter.
Note:
• Ensure that the virtual machine has enough disk space that is allocated to store the configuration
and log file data for the appliance. Allocate at least 100 GB of disk space for the appliance.
• The memory size has influence over how many Web Reverse Proxy instances can be created and how
many sessions can be active at a single point in time. The minimum memory size is 4096 MB.
• A virtual appliance must have a minimum of one and a maximum of eight network adapters.
2. Configure the virtual machine to start from the .iso file and then start the virtual machine.
• To run the installer in silent mode, wait 10 seconds or press Enter. After the silent installation
completes, the virtual machine is shut down automatically. If you want to continue with setting up
the appliance, restart the virtual machine.
• To run the installer in interactive mode, enter interactive and then press Enter.
Note: If the hard disk that is attached to the virtual machine already contains a Linux partition, the
installer always runs in interactive mode.
a. Enter YES to proceed with the installation. Alternatively if you do not want to proceed with the
installation, enter NO to move to the reboot prompt.
b. Examine the installation messages to ensure that the installation was successful. After the
installation process is complete, unmount the installation media and then press Enter to reboot
the appliance.
3. When the restart operation is complete, you can start the console-based appliance setup wizard by
logging on as the admin user with a password of admin. Alternatively, the Appliance Setup wizard can
be accessed through the local management interface.
Procedure
1. In the local management interface of the appliance, select System > Secure Settings > File
Downloads.
2. Expand Common > Sample > Deploy.
3. Select the deploy_isva_to_xen.py file.
4. Click Export to save the file to your local drive.
5. Examine the script to determine the steps to deploy and run the virtual appliance. Help on the script
can be obtained by running the following command:
Note:
• Supported python versions are 2.79 and 3.4.3.
• This script has a dependency on the requests and pexpect modules.
• This script is not supported on the Windows platform.
6. Modify the script as needed.
Note:
• Supported python versions are 2.79 and 3.4.3.
• This script has a dependency on the requests module.
For details about how to use the Amazon EC2 command line interface to launch an instance, see
Launching an Instance Using the Amazon EC2 CLI.
Creating an Amazon Machine Image (AMI) from the Virtual Hard Disk (VHD)
file
Upload the appliance VHD image to Amazon EC2 and create an AMI so that it can be deployed in Amazon
EC2.
14 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Download and install the Amazon EC2 API Tools. You can download the tool from the Amazon EC2 API
Tools page.
2. Run the following commands in the specified sequence to upload the appliance VHD for XenServer to
Amazon EC2 and create an AMI.
Procedure
1. Log in to the Amazon EC2 console.
Post-installation activities
After you install the appliance in Amazon EC2, complete these activities to enable data transmission to
Amazon CloudWatch or change the port on which the LMI listens.
Procedure
1. In the appliance local management interface, go to System > System Settings > Advanced Tuning
Parameters.
2. Click New.
3. Enter ec2.cloudwatch.frequency in the Key field.
4. In the Value field, set the frequency in minutes for the appliance to send statistical data to Amazon
CloudWatch. A value of 0 disables the service.
Note: Monitor the system log for any errors that might occur when the appliance sends the data to
CloudWatch.
5. Click Save Configuration.
16 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. In the appliance local management interface, go to System > System Settings > Advanced Tuning
Parameters.
2. Click New.
3. Enter lmi.https.port in the Key field.
4. In the Value field, enter the appropriate port so that the port on which the local management interface
listens can be used by other services on the appliance.
5. Click Save Configuration.
6. Deploy the changes.
Creating a custom size Azure compliant Virtual Hard Disk (VHD) file
IBM provides an Azure-compliant VHD file that can be used to deploy Security Verify Access to Azure.
finishes, it is not possible to resize the hard disk. This process requires a Microsoft Hyper-V environment
and the Security Verify Access firmware installation ISO.
This procedure can be automated using the generate_azure_image.ps1 Powershell Script that can
be obtained from the File Downloads page in the common > samples > deploy directory on a running
appliance.
These steps apply to Hyper-V Manager version 10 and similar.
Procedure
1. In the Hyper-V Manager, create a new virtual machine using the wizard. During the wizard:
a. When prompted to Specify Generation, select the Generation 1 option.
b. When prompted to Assign Memory, enter 2048MB or more. This amount can be changed later after
installation.
c. When prompted to Configure Networking, no network connection is required.
d. When prompted to Connect Virtual Hard Disk, create a new virtual hard disk. Set the size of the
virtual disk to the desired custom size. This size can not be changed after installation finishes.
e. When prompted for Installation Options, attach the Security Verify Access installation ISO.
2. Start the newly created virtual machine. The virtual machine boots from the Security Verify Access
installation ISO and automatically installs the Security Verify Access firmware. When this process is
complete, the virtual machine shuts down automatically.
3. Wait for the firmware to install and for the virtual machine to shut down.
4. On the Actions tab, click Edit Disk. The Edit Virtual Hard Disk Wizard is started. During the wizard:
a. When prompted to Locate Disk, select the VHD file associated with the virtual machine created
earlier.
b. When prompted to Choose Action, select the Convert option.
c. When prompted to Choose Disk Format, select VHD. Azure does not support the VHDX format.
d. When prompted to Choose Disk Type, select Fixed size. Azure does not support dynamically
expanding or thin-provisioned disks.
e. When prompted to Configure Disk, choose a new location to save the converted disk to.
5. After the Edit Virtual Hard Disk Wizard is complete, the newly converted VHD is ready to be uploaded
to Microsoft Azure.
Note:
• The Security Verify Access firmware must not be configured before preparing it to upload to Azure.
If the machine is not in the unconfigured state when first started on Azure, it will not correctly detect
the Azure environment.
• It is possible to convert the VHD using other methods, such as the Powershell extensions for Hyper-
V and qemu-img.
• The firmware installation must take place in a Microsoft Hyper-V environment. For example, you
can not install Security Verify Access in VMware and convert it to an Azure-appropriate VHD. The
hypervisor that the Security Verify Access firmware is installed in must be the same as its intended
execution environment. Microsoft Hyper-V Generation 1 is considered to be the same hardware as
Microsoft Azure by the Security Verify Access firmware.
• For details about the VHD requirements, see the General Linux Installation Notes topic on the
Microsoft Azure documentation website.
18 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Upload the VHD file using the Azure Portal.
a. In the Azure Portal, select Storage Accounts.
b. Select the storage account where the Security Verify Access VHD file will be uploaded to.
• If you do not have a storage account, click Add to create one.
• Note that the selected location will dictate where the image can be created and subsequently
deployed to.
c. Under BLOB SERVICE, select Containers.
d. Select a container to upload the Security Verify Access VHD file to.
• If you do not have a storage container, click Add Container to create one.
e. Click Upload and select the Azure-compliant Security Verify Access VHD file to upload.
• Ensure that the Blob type is set to Page Blob.
This process might take a long time depending on your network connection and the location of your
Azure storage account.
2. Create an image using the Azure Portal.
a. In the Azure Portal, select Images.
b. Click Add to create a new image.
1) Give the image a name. Remember that this image is a template that will later be deployed to a
virtual machine with a different name.
2) Ensure that the location is the same as the location of your storage account.
3) In the OS disk section:
a) Select Linux and the OS type.
b) Click Browse on the Storage Blob field. A new panel will list your storage accounts. Using
this panel, navigate through the storage account and container to locate the Security Verify
Access VHD that was uploaded.
4) Click Create to begin the image creation process. This process typically takes minutes to
complete.
c. When the process has completed, return to the Images panel and verify that the new image was
created.
This image can now be used to deploy new Security Verify Access virtual machines in Azure.
Procedure
1. In the Azure Portal, select Images.
2. Select the previously created Security Verify Access image.
3. On the Overview panel, click Create VM.
a) On the Basics page:
1) Enter a name for the new virtual machine.
2) Enter a user name, select the Password Authentication type and provide a password. You must
provide a user name and password for accessing the management console. When running on
Microsoft Azure, the default admin account is not created.
3) Complete the form and click OK.
b) On the Choose a size page:
1) Select an appropriate size for the new virtual machine, keeping in mind that the recommended
minimums are 4 GB of memory and 4 CPU cores.
2) Click Select to continue.
c) On the Settings page:
1) Configure the network settings.
Note: It is not possible to configure more than one network interface from the Azure Portal.
Additional interfaces can be added using the Azure CLI 2.0 or equivalent.
2) Click OK to continue
d) On the Summary page, revise the configuration and click OK to create the Security Verify Access
virtual machine.
20 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Settings
• Networking
– Attaching additional network interfaces is not supported.
• Disks
– Adding additional data disks is not supported.
• Extensions
– Installing extensions is not supported in Verify Access. This includes Microsoft's standard
extensions such as enablevmaccess, LinuxDiagnostic.
• Identity
Operations
• Backup
– Use the Verify Access snapshots functionality for back up or restore capabilities.
• Update management
• Inventory
• Change tracking
• Configuration Management
• Run Command
Monitoring
• Insights
• Diagnostic settings
– Boot diagnostics can be used to view the Serial log which displays the Microsoft Azure agent log
• Logs
Support and troubleshooting
• Reset password
Procedure
1. Select the hypervisor that you are using.
VMware
a. Open the vSphere Client and connect to the IBM Security Verify Access appliance.
b. Supply the host name and the user name and password.
c. Select the IBM Security Verify Access appliance from the list of VMs.
d. Select the Summary tab to view the number of CPUs assigned. In the General section of the
tab there is a line similar to the following entry.
CPU: 1 vCPU
e. Select the Resource Allocation tab to view the speed of the processors. The CPU section of the
tab displays information similar to the following entry:
f. Exit the VSphere Client. Retain this information for use in the next steps.
KVM
For more information, see the KVM documentation.
2. Consult the following document for specific instructions on how to calculate the PVUs for the target
application (the virtual appliance). See page 8 of the document:
http://public.dhe.ibm.com/software/passportadvantage/SubCapacity/x86_Scenarios.pdf
3. Use the data that you collect to place entries in the following spreadsheet. See the instructions within
the spreadsheet.
http://public.dhe.ibm.com/software/passportadvantage/SubCapacity/
Manual_Calculation_of_Virtualization_Capacity_Apr_2012.xls
4. Retain the spreadsheet and data in the event of a license compliance audit.
22 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Create a KVM virtual machine image and install the appliance firmware.
Note: After the installation is complete, remove the installation media and shutdown the machine. Do
not go through the first steps wizard before you deploy the image in the cloud.
See Installing the virtual appliance by using KVM for more detailed instructions.
2. Import the virtual image to the Cloud Orchestrator Virtual Image Library.
3. In the Virtual Image Library, check out the image to an operational repository in the KVM region where
you plan to deploy the appliance.
4. Use OpenStack to deploy the virtual image within this KVM region.
For example, to deploy the virtual image from the command line, perform these steps on the KVM
region server:
a. Set the environment variables for running OpenStack nova.
# source ~/openrc
# nova image-list
+--------------------------------------+---------------+--------+--------+
| ID | Name | Status | Server |
+--------------------------------------+---------------+--------+--------+
| 9ec1d9ec-2df9-44f6-938c-2533a4d48859 | isva | ACTIVE | |
+--------------------------------------+---------------+--------+--------+
c. Issue the nova boot command to start a new instance of the appliance image.
d. Monitor the status of the new instance using the nova list command.
# nova list
+--------------------------------------+--------------------+--------+--------------------
+
| ID | Name | Status | Networks
|
+--------------------------------------+--------------------+--------+--------------------
+
| 43f3e09c-a64d-4e11-8827-2d354be3d625 | my-isva-appliance | ACTIVE | public=172.20.96.1
|
+--------------------------------------+--------------------+--------+--------------------
+
e. The appliance is now started and the local management interface and web services interfaces are
listening on the given IP address.
5. After the machine is running in the OpenStack KVM environment, you can import it into Cloud
Orchestrator.
a. Log in to the Cloud Orchestrator management web UI.
b. Go to Configuration > Hypervisors.
c. Locate the hypervisor where the appliance is running.
d. Expand the virtual machines section and locate the appliance image.
e. Select Manage > Import the Virtual Machine.
Results
The appliance virtual machine is now visible in the Cloud Orchestrator UI on the Instances > Virtual
Machines page.
Related tasks
“Installing the virtual appliance by using KVM” on page 9
The use of Kernel-based virtual machine or KVM is supported. You can use KVM with the provided .iso
image so that you can run the virtual appliance.
Common tasks
These tasks are common for both the hardware appliance and the virtual appliance.
You can choose either of the following methods to configure initial appliance settings.
• Command-line interface (CLI)
• Local management interface (LMI)
The LMI method offers more advanced configuration options.
Navigation
You can move between screens in the wizard using the following options:
• p: Previous Screen
• n: Next Screen
To cancel the setup process at any time, use the exit command.
24 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Modules
You must configure the following modules to set up your appliance:
Module Description
Welcome Describes the appliance settings that you can
configure using the wizard.
Software License Agreement Describes the appliance license agreement, IBM
terms, and non-IBM terms.
FIPS 140-2 Mode Configuration Enable this option to turn on compliance for
NIST SP800-131a. If you enable this option, the
appliance is automatically restarted before it
continues on with the rest of the setup.
Note: Enable this option only if you must comply
with the NIST SP800-131a requirements. There
is no advantage to enabling this option if your
installation does not require it. To disable NIST
SP800-131a compliance, you must reinstall the
appliance.
When you complete the basic configuration, a summary screen displays. Review the details on the
completion page and click Complete Setup.
Procedure
1. Log in to the local management interface.
2. Click System > Updates and Licensing > Licensing and Activation.
26 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Results
The menu in the local management interface refreshes to show the menu for the activated product.
If you imported a Support license, you can update the product with service releases. See “Installing
updates” on page 53.
Attention: Ensure that the activation is completed before attempting any other activities using the
local management interface.
Silent configuration
You can configure an appliance silently after installation with the web service interfaces by providing a
metadata image that contains essential configuration data.
After the appliance firmware has been installed, shut down the machine. The ISO image that contains the
configuration meta-data can then be attached to the appliance in preparation for the initial boot of the
installed firmware. Once the appliance has successfully booted, it will mount the ISO image and then use
the configuration meta-data to automatically configure the network.
The metadata image can be created with the local management interface or manually with a text editor.
If you use a manually created metadata image for the initial configuration of an appliance, the appliance
boots up with the configured network settings automatically, but the first-steps wizard must be
completed manually. You can use the local management interface or the web service interfaces to
perform the first-steps configuration. To silently configure the appliance without the need to complete
the first-steps wizard manually, you must use a metadata image that contains the system policy. Such
metadata images can be created only through the local management interface.
See the isva_config_sample.py script available from the File Downloads page of the local
management interface as an example for silent configuration with scripts.
Procedure
1. From the top menu, select System > Secure Settings > Silent Configuration.
2. Enter the hostname to be configured on the new appliance.
3. Select the IPv4, IPv6, or both check boxes to specify static IP addresses.
• If the IPv4 check box is selected, complete the IPv4 section.
• If the IPv6 check box is selected, complete the IPv6 section.
4. To include the system policy, select the Include system policy check box.
Note:
• The system policy excludes the following configuration:
– Management interfaces
– Application interfaces
– Cluster configuration
– Advanced Access Control runtime configuration
• Besides the previously mentioned policy exclusions, there are also a few non-policy exclusions. The
support license, Security Verify Access runtime environment, reverse proxy instances, authorization
server instances, local LDAP server, policy databases, custom pages, and other files that are
uploaded to the appliance are not included in the system policy.
• If the system policy is included, when the silent configuration takes place on a new appliance, the
license agreement is automatically accepted and the first-steps wizard is automatically completed.
5. At the bottom of the page, click Generate CDROM Image or Generate USB Image to download an
image that contains this metadata.
• To use the USB image, write the IMG file to a partition on a USB device by using the dd tool.
• To use the CD-ROM image, attach the ISO file to a CD-ROM device on your virtual appliance.
Procedure
1. Create a text file with the name app-metadata at the root of the file system of the attached device.
28 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
You can include both ipv4 and ipv6 settings in the same file. If you include ipv4 or ipv6 settings, all
associated keys (address, netmask, and gateway) must be present.
The following example initially configures an IPv4 address for interface 1.1 and the appliance
hostname.
network.hostname = isva-appliance.ibm.com
network.1.1.ipv4.address = 10.20.0.11
network.1.1.ipv4.netmask = 255.255.0.0
network.1.1.ipv4.gateway = 10.20.0.1
Related tasks
“Creating a metadata image with the local management interface” on page 28
You can create a metadata image that contains essential configuration data for the initial setup of an
appliance with the local management interface. This image can later be used for the silent configuration
of a new virtual appliance.
30 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
32 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Command-line interface
Access the command-line interface (CLI) of the appliance by using either an ssh session or the console.
The following example shows the transcript of using an ssh session to access the appliance:
Tip: Use the help command to display usage notes about a specific command.
The following example shows the options available under the lmi > accounts > locked menu.
webapp.vwasp.gc.au.ibm.com:locked> help
Current mode commands:
list List all of the locked accounts and the amount of time before each
of the accounts will be automatically unlocked.
unlock_all Unlock all of the locked accounts.
unlock <account> Unlock a specific account.
The following example shows the options available under the logs menu.
webapp.vwasp.gc.au.ibm.com:logs> help
Current mode commands:
archive Archive the log files to a USB device.
delete Delete the log files which have been rolled over by the system.
delete_trace Delete the trace files (trace, stats, translog) from the system.
monitor Monitor log files on the system.
ssl Works with the Verify Access SSL log files.
The following example shows the options available under the network menu.
webapp.vwasp.gc.au.ibm.com:network> help
Current mode commands:
arp Work with the ARP cache.
defgw Work with the default gateway.
dns Work with the appliance DNS settings.
hostname Work with the applaince host name.
interfaces Work with interface settings.
routes Work with the static routes.
The following example shows the options available under the routes menu.
webapp.vwasp.gc.au.ibm.com:routes> help
Current mode commands:
add Add a static route.
delete Delete a static route.
edit Edit a static route.
reset Reset all the routing tables.
show Show the static routes including both Active and Configured.
policy_db_dump {-f <db_name>} {-l [1|2]} {-g} {-n} {-q} {-s} {-r}
{-d <find-entry-name> [-c <replace-entry-name>[:<hostname}[:<principal>]}
-f <db_name> : Specifies the name of the policy database. This argument is optional
if there is only a single Verify Access domain.
-l [1|2] : The validation check level (2 is the default).
-g : Display the glossary information only.
-n : Display the object names only.
-q : Display the sequence number of the policy database.
-s : Display statistical information from the policy database.
-r : Validate and repair the policy database. The policy server will be
restarted as a result of this command.
-d: Locate an entry in the database. If the -c flag is also specified the
located entry is replaced with the new entry, otherwise the located
entry is deleted from the database. The policy server will be restarted
as a result of this command.
-c: Replace the located entry in the database. This flag can only be used
in conjunction with the -d flag. The policy server will be restarted
as a result of this command.
The following example shows the options available under the aac menu.
webapp.vwasp.gc.au.ibm.com:aac> help
Current mode commands:
config Start a session which can be used to configure a Web Reverse
Proxy instance so that it can act as a point of contact for
Advanced Access Control.
restart Restart the Advanced Access Control runtime.
34 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
The following example shows the options available under the tools menu:
webapp.vwasp.gc.au.ibm.com:tools> help
Current mode commands:
connect Test network connection to a certain port on a specified host.
connections Display the network connections for the appliance.
curl Test the connection to a particular Web server using curl.
database Get the connections currently open to the database.
nslookup Query internet domain name servers.
ping Send an ICMP ECHO_REQUEST to network hosts.
traceroute Trace a packet from a computer to a remote destination, showing
how many hops the packet required to reach the destination and
how long each hop took.
telnet Connect to telnet server.
session Test network sessions with TCP or SSL.
The following example shows the options available under the support menu:
webapp.vwasp.gc.au.ibm.com:support> help
Current mode commands:
create Create a support information file.
delete Delete a support information file.
download Download a support information file to a USB flash drive.
get_comment View the comment associated with a support information file.
list List the support information files.
list_categories List the categories registered for the support information file.
list_instances List the instances for a specific registered category.
purge Purge the support files from the hard drive.
set_comment Replace the comment associated with a support information file.
Note: The purge command deletes all core files, crashmap files, and support files from the /var/
support/ directory.
The following example shows the options available under the pending_changes menu:
webapp.vwasp.gc.au.ibm.com:pending_changes> help
Current mode commands:
discard Discard the pending changes for a particular user or all users.
list List all users who have outstanding pending changes.
The following example shows the options available under the diagnostics menu:
webapp.vwasp.gc.au.ibm.com:diagnostics> help
Current mode commands:
java_dump Generate {heap|system|thread} java dump for
{default|runtime} profile.
kill Kill the specified process. This command will wait for the
process to be terminated before returning.
list List the contents of the local filesystem.
monitor Generate monitoring output.
monitor_list Print a list of all available monitor items.
ps List the processes which are running on the system.
The method to access the console differs between the hardware appliance and the virtual appliance:
• For the hardware appliance, a serial console device must be used. For more information about attaching
a serial console device to the hardware, see “Connecting a serial console to the appliance” on page 5.
• For the virtual appliance, you can access the console by using the appropriate VMWare software.
For example, VMWare vSphere Client.
Note: The CLI contains only a subset of the functions available from the local management interface. The
following list gives a high-level overview of the functions available from the command-line interface. To
see a list of the options for these commands, type the command name followed by -help.
diagnostics
Work with the IBM Security Verify Access diagnostics.
firmware
Work with firmware images.
fixpacks
Work with fix packs.
hardware
Work with the hardware settings.
isam
Work with the IBM Security Verify Access settings.
license
Work with licenses.
lmi
Work with the local management interface.
lmt
Work with the license metric tool.
management
Work with management settings.
network
Work with network settings.
pending_changes
Work with the IBM Security Verify Access pending changes.
snapshots
Work with policy snapshot files.
support
Work with support information files.
tools
Work with network diagnostic tools.
updates
Work with firmware and security updates.
You can also use a web service call to run most CLI commands. The web service URL is
https:<appliance>/core/cli. For details about the usage of this web service, see the REST API
documentation.
Note: The following CLI commands cannot be run via the web service:
• isam > admin
• isam > dscadmin
• isam > logs > monitor
• isam > thales > rocs
• isam > thales > hsconfig
• isam > thales > cknfastrc
• isam > thales > nfdiag
• isam > thales > ckcheckinst
• hardware > ipmitool
• management > set_password
A customizable access banner can be presented on the command line interface. Use the Login Screen
Header and Login Screen Message properties on the Administrator Settings page to set the access
banner content.
36 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Web service
The appliance can also be managed by sending RESTful web service requests to the appliance.
Only one user can remain logged in to the appliance at the same time. Each web service request
automatically displaces any existing sessions.
The following paragraphs are general notes about the usage of the web service interface. The content and
format of these web service requests are explained through the remainder of this document.
Note: The previous list contains only two headers that are mandatory for all web service requests. It is
not an extensive list of headers that are required for all request actions. The previous example shows
a curl GET request on a resource URI. This request requires only the two mandatory headers that are
listed. Other HTTP methods, such as POST or PUT, require more headers. The following example is a valid
request for starting a reverse proxy instance called inst1 using curl:
Notice the additional required header Content-type for the PUT operation.
Other HTTP clients, such as Java, might require more headers. For required headers for RESTful web
services, check the HTTP client documentation.
Web service
Deploy the pending configuration changes
URL
https://{appliance_hostname}/isam/pending_changes/deploy
Method
GET
Parameters
N/A
Response
HTTP response code and JSON error response where applicable.
38 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/deploy
Response:
200 ok
https://{appliance_hostname}/isam/pending_changes/forget
Method
GET
Parameters
N/A
Response
HTTP response code and JSON error response where applicable.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/forget
Response:
200 ok
https://{appliance_hostname}/isam/pending_changes/count
Method
GET
Parameters
N/A
Response
HTTP response code and JSON data that represents the number of pending changes.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/count
Response:
{"count": 3}
https://{appliance_hostname}/isam/pending_changes
Method
GET
Parameters
N/A
Response
HTTP response code and JSON data that represents the list of pending changes.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes
Response:
200 ok
[{
"id": 0,
"policy": "SSL Certificates",
"user": "admin",
"date": "2012-11-05T11:22:20+10:00"
}]
40 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the dashboard, locate the Notification widget.
Warning messages about the following potential problems are displayed:
• Certificates that are due to expire.
• The disk space utilization has exceeded the warning threshold.
• The CPU utilization has exceeded the warning threshold.
• There are pending changes, which have not been deployed.
• The external configuration database is not accessible.
• The external runtime database is not accessible.
• Reverse proxy instances that are not currently running. (This notification is not available when the
appliance is running in a Docker environment.)
• The database size has reached the warning threshold, which is 80% capacity. (This notification is not
available when the appliance is running in a Docker environment.)
• The time is not synced to the NTP server. (This notification is not available when the appliance is
running in a Docker environment.)
2. Take appropriate actions as required.
Procedure
1. From the dashboard, locate the Disk Usage widget.
Disk Space Pie Chart
Information about used disk space and free disk space is visualized in the pie chart.
Consumed Disk Space
How much space (in GB) is already used.
Note: Most of the disk space is typically used by log files and trace files. To minimize the disk
footprint, set the appliance to store log and trace files on a remote server. It is also a good practice
to clear unused log and trace files on a periodic basis.
Free Disk Space
How much space (in GB) is free.
Total Disk Space
How much space in total (in GB) is available to the appliance.
Note: The disk space in a hardware appliance is limited by the capacity of the hard disk drive it
carries.
2. Optional: Click Refresh to refresh the data.
Viewing IP addresses
You can view a categorized list of IP addresses that the appliance is listening on with the Interfaces
dashboard widget.
Procedure
1. From the dashboard, locate the Interfaces widget.
The IP addresses of all enabled and configured interfaces are displayed, along with the virtual IP
addresses that are managed by the front-end load balancer.
Management IPs
A list of IP addresses of the management interfaces that are enabled and configured.
Application IPs
A list of IP addresses of the application interfaces that are enabled and configured.
Load Balancer IPs
A list of IP addresses of the load balancer services.
2. Optional: Click Refresh to refresh the data.
42 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the dashboard, locate the Certificate Expiry widget.
Details about the certificates are displayed.
Certificate Label
Label of the certificate.
Expiration
The date on which the certificate expires.
Type
Type of the certificate.
Key Database
Name of the key database that the certificate belongs to.
2. Optional: Click Refresh to refresh the data.
Procedure
1. From the dashboard, locate the Partition Information widget.
Details about the active and backup partition are displayed.
Firmware Version
Version information of the appliance firmware
Installation Date
Date on which the appliance firmware was installed
Installation Type
Type of the appliance firmware installation
Last Boot
Time when the appliance was last booted
2. Optional: Click Firmware Settings to go the page to modify settings of the firmware.
Procedure
1. From the dashboard, locate the Network Traffic widget.
The In and Out traffic details for the past hour are displayed.
2. Optional: Click an interface name to display the details for a specific interface.
Procedure
1. From the dashboard, locate the Docker widget.
Deployment Model
Indicates that the appliance is running in a Docker container.
Version
The firmware version of the appliance.
Configuration Database
The status of the configuration database configuration.
Runtime Database
The status of the runtime database configuration.
User Registry
The type of user registry that has been configured (local or remote LDAP).
2. Optional: Click Refresh to refresh the data.
Procedure
1. Click IBM Security Verify Access.
2. To rearrange the placement of the widgets, click the banner of a widget and drag it to where you want
it.
Note: Widgets snap to a grid layout on the dashboard and are automatically arranged when you move
one widget to the location of another.
44 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 6. Monitoring
You can monitor the health and statistics of the appliance.
Procedure
Click Monitor > Logs > Event Log.
The system events displayed. You can:
• Click Pause Live Streaming to stop the live updating of the event log.
• Click Start Live Streaming to resume live updating of the event log.
• Click Export to download the event log file.
Notes:
a. In the exported event log file, the time occurred (occurred) field shows the seconds since Epoch
(00:00:00 Universal time, 1 January 1970).
b. When you use the table filter on the Priority field, the values that can be filtered are in English only
(low, medium, and high). This behavior is expected on all language versions of the appliance.
Procedure
1. Click Monitor > Logs > Remote Syslog Forwarding.
DRAFT - NOT FOR PUBLICATION
Procedure
1. Click Monitor > System Graphs > Memory.
2. Select a Date Range:
Option Description
1 Day Displays data points for every minute during the
last 24 hours.
3 Days Displays data points for every 5 minutes during
the last three days. Each data point is an average
of the activity that occurred in that hour.
46 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Option Description
7 Days Displays data points every 20 minutes during the
last seven days. Each data point is an average of
the activity that occurred in that hour.
30 Days Displays data points for every hour during the
last 30 days. Each data point is an average of the
activity that occurred in that hour.
3. In the Legend box, select Memory Used to review total memory utilization.
Procedure
1. Click Monitor > System Graphs > CPU.
2. Select a Date Range:
Option Description
1 Day Displays data points for every minute during the
last 24 hours.
3 Days Displays data points for every 5 minutes during
the last three days. Each data point is an average
of the activity that occurred in that hour.
7 Days Displays data points every 20 minutes during the
last seven days. Each data point is an average of
the activity that occurred in that hour.
30 Days Displays data points for every hour during the
last 30 days. Each data point is an average of the
activity that occurred in that hour.
3. In the Legend box, select the CPU utilization data that you want to review:
• User
• System
• Idle
Chapter 6. Monitoring 47
DRAFT - NOT FOR PUBLICATION
Procedure
1. Click Monitor > System Graphs > Storage.
2. Select a Date Range:
Option Description
1 Day Displays data points for every minute during the
last 24 hours.
3 Days Displays data points for every 5 minutes during
the last three days. Each data point is an average
of the activity that occurred in that hour.
7 Days Displays data points every 20 minutes during the
last seven days. Each data point is an average of
the activity that occurred in that hour.
30 Days Displays data points for every hour during the
last 30 days. Each data point is an average of the
activity that occurred in that hour.
Procedure
1. From the top menu, select Monitor > Network Graphs > Application Interface Statistics.
2. In the Date Range field, select the period to display the statistics for.
Option Description
1 Day Displays data for every 20-minute interval in one
day.
3 Days Displays data for every 20-minute interval during
the last three days.
7 Days Displays data for every 20-minute interval during
the last seven days.
30 Days Displays data for every day during the last 30
days.
48 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Monitor > Application Log Files.
The displayed directories contain the application log files that can be viewed and downloaded:
• access_control: Contains log files specific to the Advanced Access Control offering. It contains
subdirectories for different categories of log files, such as auditing, isamcfg, and runtime.
• cluster: Contains logs files for the cluster manager.
• management_ui: Contains log files for the management interface.
• federation: Contains logs files specific to the Federation offering.
By default, the log files are displayed in a tree view.
2. Optional: Click Details View to manage the log files using a more detailed view. This view shows the
path, file size, and last modified time of each log file. You can also order the files by name, path, file
size, or last modified time.
3. Optional: Click Refresh to get the most up-to-date data.
4. You can then view or download the displayed log files.
To view the log file
a. Select the file of interest.
b. Click View. The content of the log file is displayed. By default, the last 100 lines of a log file are
displayed if the file is longer than 100 lines. You can define the number of lines to display by
entering the number in the Number of lines to view field and then click Reload. Alternatively,
you can provide a value in the Starting from line field to define the start of the lines. If the
Starting from line field is set, then the Number of lines to view field determines how many
lines to view forward from the starting line. If the Starting from line field is not set, then the
Number of lines to view field determines how many lines to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
c. Optional: Click Export to download the log file.
To download the log file
a. Select the file of interest.
b. Click Export to save the file to your local drive.
c. Confirm the save operation in the browser window that pops up.
To clear or empty a log file
a. Select the file or files of interest.
b. Click Clear to clear the contents of the file.
c. In the confirmation window, click Yes to confirm the clear operation.
To delete a log file
a. Select the file or files of interest.
Note: It is the administrator's responsibility to make sure that the log file to be deleted is not in
use by the system.
b. Click Delete to remove the log file.
c. In the confirmation window, click Yes to confirm the deletion.
Chapter 6. Monitoring 49
DRAFT - NOT FOR PUBLICATION
Procedure
1. Select the Runtime Tracing link from the top of this page. You can also access this panel from the top
menu by selecting Monitor > Logs > Runtime Tracing.
2. Use one of the following ways to edit the trace level of a component.
• Select the component name from the Component list. Select the ideal trace level for this component
from the Trace Level list. Then, click Add. Repeat this process to modify trace levels for other
components if needed. To clear all of the tracing levels, click Clear.
To log all events, select ALL as the trace level.
Note: This setting increases the amount of data in logs, so use this level when necessary.
com.tivoli.am.fim.authsvc.*
com.tivoli.am.fim.trustserver.sts.modules.*
Table 3. Valid trace levels. The following table contains the valid trace levels.
Level Significance
ALL All events are logged. If you create custom
levels, ALL includes those levels and can
provide a more detailed trace than FINEST.
FINEST Detailed trace information that includes all
of the details that are necessary to debug
problems.
FINER Detailed trace information.
FINE General trace information that includes methods
entry, exit, and return values.
DETAIL General information that details sub task
progress.
CONFIG Configuration change or status.
INFO General information that outlines the overall
task progress.
AUDIT Significant event that affects the server state or
resources.
WARNING Potential error or impending error. This level can
also indicate a progressive failure. For example:
the potential leaking of resources
SEVERE The task cannot continue, but component,
application, and server can still function.
This level can also indicate an impending
unrecoverable error.
50 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Table 3. Valid trace levels. The following table contains the valid trace levels. (continued)
Level Significance
FATAL The task cannot continue, and component,
application, and server cannot function.
OFF Logging is turned off.
• Enter the name and value of the trace component in the Trace Specification field. To modify
multiple components, separate two strings with a colon (:). Here is an example.
com.x.y.*=WARNING:com.a.b.*=WARNING:com.ibm.isva.*=INFO
3. Click Save.
Chapter 6. Monitoring 51
DRAFT - NOT FOR PUBLICATION
52 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 7. System
Information about configuring Security, Network, and System settings of your appliance.
Procedure
1. Click System > Updates and Licensing > Overview.
2. View the updates and licensing information. Click the links on the page to make a specific update.
Installing updates
Install firmware and intrusion prevention updates to improve the appliance and the network protection
that is provided by the appliance.
Procedure
1. Click System > Updates and Licensing > Available Updates.
2. On the Available Updates page, use one or more of the following commands:
Option Description
Upload To manually add an update, click Upload. In
the New Update window, click Select Update,
browse to the update file, click Open, and then
click Submit.
Note: You can install the update after you
manually add it.
Procedure
1. Click System > Updates and Licensing > Scheduled Security Updates.
2. In the Update Schedule pane, select Auto Update to receive X-Force content updates.
3. Use one of the following methods to schedule updates:
• To receive updates on a daily basis, select Daily or Weekly, select Every Day from the first list, and
then select a time from the second list.
• To receive updates on a weekly basis, select Daily or Weekly, select the day of the week you would
like to receive updates on, and then select a time from the second list.
• To receive updates on a schedule that ranges from 1 hour to 24 hours, select Specified Interval,
and then select the update interval in minutes.
Range: 60 - 1440 minutes
4. Click Save.
Procedure
1. Click System > Updates and Licensing > Update Servers.
2. In the Update Servers pane, take one of the following actions:
• To add an update server, click New. The Add Server window is displayed.
• To edit an update server, select the server, and then click Edit. The Edit Server window is
displayed.
• To delete an update server, select the server, and then click Delete.
3. When you add or edit an update server, configure the following options on the General tab:
Option Description
Order Defines the order in which update servers are
queried for appliance software updates.
The appliance uses the next server on the list
when a server takes more than 24 hours to
respond.
54 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Option Description
Server Address The IP address or DNS name of the update
server.
Port The port number that the appliance uses to
communicate with the update server.
Tip: The port number for the IBM ISS Download
Center is 443. The default port for internal update
servers is 3994.
Chapter 7. System 55
DRAFT - NOT FOR PUBLICATION
4. Optional: If you use a proxy server, configure the following settings on the Proxy Settings tab:
Option Description
Use Proxy Enables the appliance to use a proxy server for
update servers.
Server Address The IP address or DNS name of the proxy server.
Note: The Server Address field is displayed
when you select the Use Proxy check box.
5. Click Submit.
Procedure
1. Click System > Updates and Licensing > Update History.
2. To refresh the page, click Refresh.
Installing a fix pack
Install a fix pack when IBM Customer Support instructs you to do so.
56 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. In the local management interface, go to System > Updates and Licensing > Fix Packs.
2. In the Fix Packs pane, click New.
3. In the Add Fix Pack window, click Browse for fix pack: to locate the fix pack file, and then click Open.
4. Click Save Configuration to install the fix pack.
Installing a license
You must install a current license file to receive updates to the appliance.
Procedure
1. Optional: If you are not configuring your appliance for the first time, click System > Updates and
Licensing > Licensing and Activation.
2. On the Licensing and Activation page, click Select License and locate the license file that you want to
install.
3. Select the license file that you want to install and then click Open.
4. Click Save Configuration.
Note: OCNID stands for Order Confirmation Number and ID.
Procedure
1. Click System > Updates and Licensing > Firmware Settings.
2. On the Firmware Settings page, perform one or more of the following actions:
Option Description
Edit To edit the comment that is associated with a
partition, select the partition and click Edit.
Create Backup Important: Create a backup of your firmware
only when you are installing a fix pack that is
provided by IBM Customer Support.
Chapter 7. System 57
DRAFT - NOT FOR PUBLICATION
Option Description
Fix packs are installed on the active partition and
you might not be able to uninstall the fix pack.
Note: The backup process can take several
minutes to complete.
Set Active Set a partition active when you want to use the
firmware that is installed on that partition. For
example, you might want to set a partition active
to use firmware that does not contain a recently
applied update or fix pack.
3. Click Yes.
If you set a partition active, the appliance restarts the system using the newly activated partition.
Procedure
1. In the local management interface, go to System > Updates and Licensing > Trial.
2. Click Import.
3. Browse to the certificate and confirm the import operation.
Installing an extension
Install an IBM Security Verify Access extension in the environment.
58 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the dashboard, click System > Updates and Licensing > Extension.
2. In the Extensions pane, click New.
3. Upload the extension support file and click Next.
4. On the next dialogue box, provide the configuration parameter details and upload the third-party
dependency.
5. Click Install.
Network Settings
Information about configuring network interfaces and information about your appliance.
Procedure
1. From the top menu, select System > Network Settings > General.
2. Enter the host name.
Note: Changing the appliance host name causes the security device to reset the network connection.
You must reconnect after the network connection is reset. This process does not interrupt traffic
through the application interfaces.
3. Click Save Configuration.
Configuring DNS
Define the DNS settings for your interfaces.
Chapter 7. System 59
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > Network Settings > DNS.
• To set the DNS via DHCP of an interface:
a. Select Auto.
b. Select the interface from the list.
• To use manual DNS settings:
a. Select Manual.
b. Define the following settings:
– Primary DNS (mandatory)
– Secondary DNS
– Tertiary DNS
– DNS Search Path
2. Click Save Configuration.
Configuring interfaces
Create or edit your management and application interfaces.
Procedure
1. From the top menu, select System > Network Settings > Interfaces.
All current management and application interfaces are displayed.
60 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
2. You can add or edit interfaces and addresses that are associated with an interface.
• To add an interface:
a. Click New.
b. On the General Configuration tab:
1) Select the type of interface to create.
Note: For interfaces of the type Loopback, DHCP and bonding options are not available.
2) Enter a name for the interface.
3) Select the Enabled checkbox if you want to enable this interface at the same time when it is
created.
4) Enter the virtual LAN ID for the interface.
5) Add notes about this interface in the Comment field.
c. Click Save Configuration to confirm the details of this interface.
• To modify the details of an interface:
a. Select the interface from the table.
b. Click Edit.
c. Modify the details as needed.
d. Click Save Configuration to confirm the modified details.
• To delete a virtual interface:
a. Select the interface from the table.
b. Click Delete.
c. Click Yes to confirm the operation.
• To add an IP address to an interface:
a. Select the interface.
b. Click Edit.
c. On the IPv4 Settings tab:
1) If you want to use DHCP to assign addresses, select Auto.
a) To make this interface a management interface, select the Management Interface
checkbox. To make this interface an application interface, leave this checkbox unchecked.
b) Select the Provides Default Route if needed.
2) If you want to use static addresses, select Manual.
a) Click New to add an address.
b) Enter the static address in the Address field in the format of <address>/<mask>. Masks
are supported in dot-decimal and CIDR notation, for example:
10.0.2.38/24
10.0.2.38/255.255.255.0
c) To use this address for management purposes, select the Management Address
checkbox. To use this address for application, leave this checkbox unchecked.
d) By default, the appliance performs validation to ensure that overlapping subnets do
not span multiple interfaces. Such validation helps prevent networking issues in certain
Chapter 7. System 61
DRAFT - NOT FOR PUBLICATION
environments. If you want to disable this validation for your environment, select the
Override the Overlapping Subnet Validation option.
e) Click Save Configuration to confirm the details.
d. On the IPv6 Settings tab:
1) If you want to use DHCP to assign addresses, select Auto.
a) To make this interface a management interface, select the Management Interface
checkbox. To make this interface an application interface, leave this checkbox unchecked.
2) If you want to use static addresses, select Manual.
a) Click New to add an address.
b) Enter the static address in the Address field in the format of <address>/<mask>. Masks
must be given in CIDR notation, for example:
2001:db8::38/48
c) To use this address for management purposes, select the Management Address
checkbox. To use this address for application, leave this checkbox unchecked.
d) Click Save Configuration to confirm the details.
• To modify an IP address that is associated with an interface:
a. Select the interface.
b. Click Edit.
c. On the IPv4 Settings and IPv6 Settings tabs, select the address to modify and then click Edit.
d. Modify the settings as needed.
e. In the Edit address window, click Save Configuration to close the window.
f. Click Save Configuration to confirm the interface details.
• To delete an IP address that is associated with an interface:
a. Select the interface.
b. Click Edit.
c. On the IPv4 Settings and IPv6 Settings tabs, select the address to delete and then click
Delete.
d. Click Yes to confirm the delete operation.
e. Click Save Configuration to confirm the interface details.
62 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 7. System 63
DRAFT - NOT FOR PUBLICATION
64 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Note: Many services on the appliance can be configured to access external service ports such as LDAP,
SQL, DNS, NTP Web Reverse Proxy junctions, OCSP, Kerberos, and syslog server ports. The routing that
is configured on the appliance determines which outgoing interface is used to access them based on the
external service's IP address.
Configuration options for these bonding modes are available through the appliance advanced tuning
parameters. If set, the parameters apply to all bonding interfaces. For more details, see “Managing
advanced tuning parameters” on page 101.
The bonding (enslave) order of the slaves is not configurable. The network device that is configured as the
primary bonding device uses its underlying physical device as the first bonded slave.
Note: Expect interruption to any existing network traffic on the involved interfaces when the
configuration changes are committed.
Procedure
1. From the top menu, select System > Network Settings > Interfaces.
Chapter 7. System 65
DRAFT - NOT FOR PUBLICATION
2. Edit the appliance interface to be replaced by the virtual bonding interface behind which the
aggregation of interfaces is placed. The physical network interface that is normally represented by this
configuration is the first interface aggregated behind the bonding virtual interface.
a) Select the interface and then click Edit.
b) For this interface, set the Bonding Mode to something other than None or Slave.
For example, 802.3ad.
Note: Some bonding modes, such as 802.3ad, require equivalent support from the network
switch to which they are attached.
c) Set the IP addresses of the interface, if not already set. This interface configuration defines the IP
address of the aggregation.
d) Save the configuration.
3. Edit each additional interface to be added to the aggregation. For each slave:
a) Set the Bonding Mode to Slave.
Note: If you have an existing bonding configuration on an interface, you must set the bonding
configuration back to None and deploy the change before you can set the interface to be a slave.
That is, the Slave option does not appear when you list the available modes on an interface with
an existing bonding configuration. You must first clear the existing bonding configuration by setting
the bonding mode to None. After deploying the change, you can see the Slave option in the list.
b) For the Bonded To field, select the initial interface that was configured in previous steps.
c) Save the configuration.
4. Commit the changes.
Procedure
1. From the top menu, select System > Network Settings > Static Routes.
2. Select the route table to edit from the Route Table For field.
You can use these route tables to configure routes that are specific to requests destined for a
particular local IP address. Use the Default table if specific local IP address control is not required.
3. Take one of the following actions:
• Click New to create a route.
• Select an existing route, and then click Edit to change the settings.
• Select an existing route, and then click Delete to remove it.
4. Define the following information in each field:
• Enabled
• Destination
Note: To make this route the default gateway, enter Default in the Destination field.
• Gateway
• Metric
• Interface
66 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > Network Settings > Test Connection.
2. You can test a TCP or SSL connection.
Testing a TCP connection
a. Select the TCP option.
b. Enter the server, port, and optionally the timeout value.
c. Click Test Connection. Any message that is generated as output of the connection test is
displayed at the bottom of the page.
Testing an SSL connection
a. Select the SSL option.
b. Enter the server, port, and optionally the timeout value.
c. Select Show SSL Advanced Parameters to display additional SSL parameters that can be
specified.
d. Define any SSL additional parameters as needed.
Chapter 7. System 67
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > Network Settings > Hosts File.
All current host records with their IP address and host names are displayed.
68 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
2. You can then work with host records and host names.
• Add a host record
a. Select the root level Host Records entry or do not select any entries.
b. Click New.
c. On the Create Host record page, provide IP address and host name of the host record to add.
d. Click Save.
• Add a host name to a host record
a. Select the host record entry to add the host name to.
b. Click New.
c. On the Add Hostname to Host Record page, enter the host name to add.
d. Click Save.
• Remove a host record
a. Select the host record entry to delete.
b. Click Delete.
c. On the confirmation page, click Yes to confirm the deletion.
• Remove a host name from a host record
a. Select host name entry to delete.
b. Click Delete.
c. On the confirmation page, click Yes to confirm the deletion.
Note: If the removed host name is the only associated host name for the IP address, then the
entire host record (the IP address and host name) is removed.
Procedure
1. From the top menu, select System > Network Settings > Shared Volume.
All contents of the shared volume are displayed under the relevant directories.
fixpacks
Fix pack files.
snapshots
Snapshot files.
support
Support files.
2. You can upload, download, rename, or delete these files as needed.
3. Optional: Click Refresh to get the most up-to-date data.
Chapter 7. System 69
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > Network Settings > Packet Tracing.
The status of packet tracing is displayed.
Note: The top grid shows the status of the packet tracing along with the details of the current PCAP
tracing file only. The bottom grid shows the details of the current PCAP tracing file along with any
existing rollover PCAP tracing files.
2. Manage packet tracing settings.
• Start packet tracing
a. Click Start.
b. On the Start Packet Tracing page:
1) Select the interface name in the Interface field.
Note: If no value is selected for the Interface field, packet tracing is enabled for all interfaces.
2) Optional: Click the Filter field.
3) Optional: On the Set Filter page, select a pre-defined filter in the Display Filter field, or enter
the filter manually in the Filter String field.
4) Click Save.
5) Define the maximum size of the packet tracing file (PCAP file) in the Maximum File Size field.
This value is the maximum size that the packet tracing file can grow to before packet tracing is
disabled.
Note: If no value is selected for the Maximum File Size field, the maximum file size is set to
half the remaining disk size.
6) Define the maximum amount of data (in bytes) to be collected for each frame in the snap
length field.
Note: The valid range for this field is 1 to 65535. If no value is specified, the snap length is set
to 65535 bytes.
7) Define the maximum number of log rotation files in the maximum files field. If this number is
greater than 0, the number of log files created is limited to the specified number.
When the maximum number of files is reached the capture begins overwriting files from the
beginning, thus creating a 'rotating' buffer. With this 'rotating' buffer, packet capture does not
70 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
stop once the log files are full. If the value is set to 0 there is a single log file and when this file
is full, packet capture stops.
Note: The valid range for this field is 0 to 99. If no value is specified, the maximum files is set
to 0.
c. Click Start.
Note: Only a single packet tracing operation can be running at the same time. A new packet trace
cannot be started until the PCAP file from the previous trace is deleted.
• Stop packet tracing
a. Click Stop.
b. Click Yes to confirm the action.
• Export the packet tracing PCAP file
a. Select the trace file to export from the Packet Tracing Files grid.
b. Click Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
c. Confirm the save action in the browser pop-up window.
• Delete the packet tracing PCAP file
a. Click Delete.
b. Click Yes to confirm the action.
Note: If packet tracing is running, the PCAP file cannot be deleted. You must stop the associated
packet tracing before you delete the PCAP file.
The delete option deletes all the tracing files including the rollover files.
Creating a cluster
You can configure multiple appliances into a cluster that shares configuration information and runtime
information. Use the Cluster Configuration management page to administer cluster support for the
appliance.
Chapter 7. System 71
DRAFT - NOT FOR PUBLICATION
Procedure
1. Select an appliance to be the primary master. You can choose any appliance as the primary master if it
is not a member of another cluster. If the selected appliance is in another cluster, you must unregister
it before you can appoint it as the primary master of a new cluster.
2. On the General tab of the Cluster Configuration page:
a. Select the Multinode option.
b. Click Create Cluster.
c. In the Create Cluster window, configure the Cluster Identifier, and then click Create Cluster.
Note: For more information about the Cluster Identifier, see “Cluster general configuration reference”
on page 76.
3. Save and deploy this update. The chosen appliance is configured as the primary master of a cluster
that can contain multiple nodes.
4. Export the cluster signature file on the primary master. The cluster signature file contains configuration
information so that cluster members can identify and communicate with the primary master.
5. Join appliances to the cluster by importing the cluster signature file on each appliance that you want to
become a cluster member. The process of joining an appliance to the cluster is a registration.
6. Update the cluster configuration on the primary master. As part of the cluster configuration, you
can define more masters from the pool of registered nodes. For more information, see “Failover in a
cluster” on page 161.
7. Save and deploy the configuration changes.
Note: As a rule, try to limit the number of changes that are made to the cluster configuration in a
single policy update.
Related reference
“Cluster general configuration reference” on page 76
Use the Cluster Configuration management page to administer cluster support for the appliance.
“Session cache reference” on page 77
Use the Cluster Configuration management page to administer cluster support for the appliance.
“Runtime database” on page 83
You can view and update the current runtime database settings with the Runtime Database tab on the
Cluster Configuration management page.
72 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
• These initial settings indicate that by default the appliance operates as a stand-alone cluster with a
single node.
• If you do not want this appliance to be the primary master, but rather a node in an existing cluster,
follow the steps in Join the current appliance to the cluster.
• When the Stand-alone option is selected, the First Port field is enabled and the fields under Masters
for All Services are disabled.
About the Multi-node option:
• To use this appliance as the primary master of a cluster with multiple nodes, you must set the Multi-
mode option.
• When the Multi-node option is selected:
– If the appliance is the primary master, the First Port field is enabled.
– If the appliance is not the primary master, the First Port field is disabled.
Note: Cluster configuration updates do not take effect until you deploy the changes through the local
management interface.
Procedure
1. From the top menu of the local management interface, select System > Cluster Configuration. A list
of the nodes in the cluster is under Nodes.
Chapter 7. System 73
DRAFT - NOT FOR PUBLICATION
2. Take any of the following actions and click Save. Clicking Save submits all configuration changes from
the General, Session Cache, and Database tabs.
Add a description to a cluster node
a. Select the node.
b. Click Edit Description.
c. Enter the description for the node.
Specify an appliance to be the primary master of a cluster
a. Select the General tab.
b. To make the current node the primary master:
• If the appliance is in stand-alone mode, select Multi-node.
• If the appliance is a non-primary node in a cluster, click Make Primary Master.
View and update the current cluster general configuration
Note: You can perform the update operation only through the primary master local management
interface.
a. Select the General tab.
b. Edit the current configuration.
View and update the current cluster session cache configuration
Note: You can perform the update operation only through the primary master local management
interface.
The distributed session cache is one of the cluster services. It is used by the IBM Security Verify
Access appliance to distribute session data. You must configure the distributed session cache
settings for the cluster on the primary master.
a. Select the Session Cache tab.
b. Edit the current settings.
View and update the current runtime database configuration
The runtime database stores runtime data.
Note: You can perform the update operation only through the primary master local management
interface.
a. Select the Database tab.
b. Edit the current settings.
If you change the location of the runtime database from Local to the cluster to Remote to the
cluster, Database Maintenance displays the following error message:
74 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 7. System 75
DRAFT - NOT FOR PUBLICATION
2) Select the node you want to remove from Nodes on the Overview tab.
b. Click Delete.
c. To force the removal of the node even if the node cannot be reached, select the Force.
d. Click Yes.
Replicate settings across the cluster
You can enable the replication of the IBM Security Verify Access runtime settings and certificate
database settings. After you enable the replication option, you can no longer update runtime and
certificate database settings from the non-primary nodes.
Note: Perform this operation through the local management interface of the primary master.
a. Select the Replication tab and take one of the following actions:
• For runtime settings, click Runtime component.
• For certificate database settings, click Certificate databases.
b. Select Replicate with Cluster.
c. Click Yes.
3. Deploy the changes.
Related reference
“Cluster general configuration reference” on page 76
Use the Cluster Configuration management page to administer cluster support for the appliance.
“Session cache reference” on page 77
Use the Cluster Configuration management page to administer cluster support for the appliance.
“Runtime database” on page 83
You can view and update the current runtime database settings with the Runtime Database tab on the
Cluster Configuration management page.
76 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
• Add the entries for Primary Master, Secondary Master, Tertiary Master, and Quaternary Master
in order. For example, you cannot add a tertiary unless a secondary exists, and you cannot remove a
secondary if a tertiary exists.
• Use the Secondary Master, Tertiary Master, and Quaternary Master fields to manage the
supplementary masters. You can update these values at any time to demote existing masters or
promote new masters.
When you configure the master nodes, you must adhere to the cluster configuration rules. For more
information, see “Cluster configuration rules” on page 168.
Secondary Master
The cluster identifier of the secondary master.
Master External Reference Entity
The IP address of an external reference device that the primary and secondary masters can use to
check the health of the network.
Note: This field is required if both the Primary Master and Secondary Master fields are set.
Otherwise, it is disabled.
Tertiary Master
The cluster identifier of the tertiary master.
Note: You can set this field only if there is a Secondary Master defined.
Quaternary Master
The cluster identifier of the quaternary master.
Note: You can set this field only if there is a Tertiary Master defined.
Chapter 7. System 77
DRAFT - NOT FOR PUBLICATION
Notes:
• The current version supports internal clients only.
• If this option is selected, the remaining fields are disabled.
• Clients can be turned off. For more information about failover events, search for the Options for
handling session failover events topic in the Administering topics in the Knowledge Center. For more
information about configuration properties, see Advanced configuration properties.
Support internal and external clients
Indicates that both internal and external clients can use the distributed session cache.
Note: To share the key files across the cluster, navigate to the SSL Certificates page and select the
Replicate with Cluster check box.
Session cache supports mutual TLS. Ensure that the client’s certificate in the Distributed Session
Cache (DSC) server’s trust store and the server’s certificate in the client’s truststore are added.
The DSC by default supports internal client. It runs on port 2026 and 2027. If external clients support
is required, use a different port.
Port
The port on which external clients can communicate with the session cache. This field is mandatory if
you enable support for internal and external clients.
Enable SSL
If selected, the distributed session cache uses secure communication with its clients.
Note: If you enable SSL, you must also configure the Keyfile.
Keyfile
Lists the existing keyfiles on the appliance. These keyfiles are managed from the SSL certificates page.
You can click the SSL Certificates link on the right to go to that page.
Note: If you want to share the key files across the cluster, you must go to the SSL Certificates page
and select the Replicate with Cluster check box.
Label
Lists the certificate labels in the selected keyfile. This field is disabled if a keyfile is not selected.
Trace level
Specifies the trace level for the DSC with an integer (0 - 9). 0 indicates that trace is disabled. 9
indicates the maximum trace level.
Note: The trace level setting is not a part of the cluster policy. So this setting is not replicated across
the cluster and is not persistent across firmware updates. The trace messages are sent to the log file
for the DSC.
Configuration database
You can view and update the current configuration database settings with the Configuration Database
tab on the Cluster Configuration management page.
Note: If Oracle is set as the external configuration database and either the local management interface
or runtime server trace specification includes Oracle trace points (for example, oracle.*) the underlying
Oracle JDBC jar file is changed to a debugging jar file. This might have adverse effects on performance
and as such Oracle tracing should only be enabled for debugging purposes and disabled once complete.
Warning: Enabling trace for Oracle components “oracle.*” might result in the Oracle database
administrator password being logged in clear text.
The configuration database stores configuration data, including policy information. This data is shared
with all appliances in the cluster.
Local to the cluster
Specifies the use of the internal configuration database.
78 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Database export
Exports the current configuration data from the internal database so that it can be imported
into an external database of the chosen type. This option is useful if you want to migrate the
appliance's internal configuration database to an external database. Supported external database
types are DB2, Oracle, and PostgreSQL. The exported data are compressed into a zip file. A
readme file is included in the zip file to provide instructions on how to import the data into the
external database.
Note: For DB2 and Oracle, the configuration database schema (table and index definitions), which
is available from the File Downloads area of the appliance, must be applied to the database that
will house the configuration data before the data can be imported. For PostgreSQL, this step is not
required as the zip file also contains the database schema.
Remote to the cluster
Specifies the use of an external configuration database. Specify the following information for the
external configuration database:
Use external database for internal file sharing
Enable this option to allow the configurations to be modified on non-primary nodes of the cluster.
Note: When you enable this option, the appliance will be rebooted when the change is
committed. During the reboot, the files will be migrated between the local file system and the
external configuration database.
Type
The database type, which is one of DB2, Oracle, or PostgreSQL.
Address
The IP address or hostname of the external database server.
Port
The port on which the external database server is listening.
Username
The name of the database administrator.
Password
The password for the database administrator.
DB2
Secure
Select this check box to create a secure connection with the DB2® server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the DB2 server. The certificate must be
imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Database name
The name of the database instance on the external DB2 server.
Enable HADR and ACR
Select this checkbox to enable High Availability Disaster Recovery and Automatic Client
Reroute.
Alternate Address
The IP address or hostname of the failover database server in the HADR configuration.
Alternate Port
The port on which the failover database server in the HADR configuration is listening.
Oracle
Secure
Select this check box to create a secure connection with the Oracle server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the Oracle server. The certificate must
Chapter 7. System 79
DRAFT - NOT FOR PUBLICATION
be imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Service name
The name of the service instance on the external Oracle server.
Driver type
Specifies the type of Oracle JDBC driver that is used to connect to the Oracle server.
Available options are Thin and OCI.
PostgreSQL
Note: High availability, with an external PostgreSQL server, is achieved through the use of an
external load balancer.
Secure
Select this check box to create a secure connection with the PostgreSQL server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the PostgreSQL server. The certificate
must be imported into the lmi_trust_store and rt_profile_keys key files. Use the
SSL Certificates page to import the appropriate certificate.
Database name
The name of the database instance on the external PostgreSQL server.
Enable failover support
Select this check box to enable PostgreSQL failover support. Once this box is checked, the
failover servers management section is enabled.
Failover servers
Manage the PostgreSQL failover servers in this section.
Add
1. Click the Add button to add a new failover server. A new dialog opens.
2. Specify the new failover server address and port.
3. Click Submit to add the server.
Delete
1. Select the failover server in the grid.
2. Click the Delete button to remove the server from the list.
Move Up and Move Down
1. Select the failover server in the grid.
2. Click the Move Up or Move Down button to change the order of the server in the
list.
80 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Note: IBM Security Verify Access uses the configured username as the schema name to connect to the
database. Therefore, aliases might need to be created in DB2 in the event that the username does not
match the schema name in the database.
Procedure
1. Use the File Downloads management page in the local management interface to access the
configuration database deployment files for your environment.
Oracle script
a. Copy the downloaded cluster_config_oracle.sql file into the Oracle home directory.
For example, ORACLE_HOME=/opt/oracle/app/oracle/product/11.2.0/dbhome_1
b. Log in to SQL*Plus.
c. At the SQL prompt, run START cluster_config_oracle.sql.
DB2 script
a. Create a DB2 instance to contain the configuration database. For information about creating
the DB2 instance, see the DB2 documentation.
b. Open the cluster_config_db2.sql file in an editor on the DB2 server.
c. Replace the following macros with the values specific to your environment:
&DBINSTANCE
The name of the DB2 instance.
&DBUSER
The name of the DB2 administrator.
&DBPASSWORD
The password for the DB2 administrator.
d. Save the changes.
e. Log in to the DB2 Command utility (Windows) or DB2 host (UNIX) as the DB2 administrator.
f. Run the following command:
The following example shows the fully qualified path to the script:
Chapter 7. System 81
DRAFT - NOT FOR PUBLICATION
82 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Results
The appliance is configured to use the configuration database that is deployed on the external system.
What to do next
• Tune the external database by setting the configuration parameters. See Runtime database tuning
parameters.
• On Oracle 12.2 check that the supported login protocol is set on the DBMS. If it is not, set the value
SQLNET.ALLOWED_LOGON_VERSION=11 in the sqlnet.ora file. For more information, see https://
docs.oracle.com/en/database/oracle/oracle-database/12.2/upgrd/required-tasks-complete-
upgrading-oracle-database.html#GUID-12B920E9-B2DA-48A0-832C-3E07D172A011
Runtime database
You can view and update the current runtime database settings with the Runtime Database tab on the
Cluster Configuration management page.
Note: If Oracle is set as the external runtime database and either the local management interface or
runtime server trace specification includes Oracle trace points (for example, oracle.*) the underlying
Oracle JDBC jar file is changed to a debugging jar file. This might have adverse effects on performance
and as such Oracle tracing should only be enabled for debugging purposes and disabled once complete.
Warning: Enabling trace for Oracle components “oracle.*” might result in the Oracle database
administrator password being logged in clear text.
Chapter 7. System 83
DRAFT - NOT FOR PUBLICATION
The runtime database contains runtime data that is used by the context-based access component. You
can configure this database as an embedded database or an external database. The embedded database
is suitable for small environments only. For large-scale production environments, configure an external
database.
Local to the cluster
Specifies the use of the internal runtime database.
Note: Only the Maximum Size field relates to the internal runtime database. If you use the internal
runtime database, all other fields are disabled.
Maximum Size (% of available disk)
The size of the internal runtime database. If you select the Local to the cluster option, this field
is mandatory. The maximum size is a percentage of the remaining disk space at the time that the
policy is applied.
The valid value range is from 10% to 80%. If a change in this value results in a calculated maximum
size, which is smaller that the current size of the database, the database must be re-created. In
this case, all existing data from the database is lost.
To determine the percentage of available disk space to assign to the internal database, consider
the following aspects of your environment:
• The current disk usage on the appliance. You can view the Disk Usage on the Appliance
Dashboard in the LMI.
• Internal disk requirements for other utilities such as logging and snapshots.
Database export
Exports the current runtime data from the internal database so that it can be imported into an
external database of the chosen type. This option is useful if you want to migrate the appliance's
internal runtime database to an external database. Supported external database types are
DB2, Oracle, and PostgreSQL. The exported data are compressed into a zip file. A readme file
is included in the zip file to provide instructions on how to import the data into the external
database.
Remote to the cluster
Specifies the use of an external runtime database. Specify the following information for the external
runtime database:
Type
The database type, which is either DB2, Oracle, or, PostgreSQL.
Address
The IP address or hostname of the external database server.
Port
The port on which the external database server is listening.
Username
The name of the database administrator.
Password
The password for the database administrator.
DB2
Secure
Select this check box to create a secure connection with the DB2 server.
Note: Before a secure connection can be established, you must first import the certificate
for the appliance to use for communication with the DB2 server. The certificate must be
imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Database name
The name of the database instance on the external DB2 server.
84 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 7. System 85
DRAFT - NOT FOR PUBLICATION
Procedure
1. Use the File Downloads management page in the local management interface to access the runtime
database deployment files for your environment.
86 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Oracle script
a. Copy the downloaded isam_access_control_oracle.sql file into the Oracle home
directory. For example, ORACLE_HOME=/opt/oracle/app/oracle/product/11.2.0/
dbhome_1
b. Log in to SQL*Plus.
c. At the SQL prompt, run START isam_access_control_oracle.sql.
DB2 script
a. Create a DB2 instance to contain the runtime database. For information about creating the
DB2 instance, see the DB2 documentation.
b. Open the isam_access_control_db2.sql file in an editor on the DB2 server.
c. Replace the following macros with the values specific to your environment:
&DBINSTANCE
The name of the DB2 instance.
&DBUSER
The name of the DB2 administrator.
&DBPASSWORD
The password for the DB2 administrator.
d. Save the changes.
e. Log in to the DB2 Command utility (Windows) or DB2 host (UNIX) as the DB2 administrator.
f. Run the following command:
The following example shows the fully qualified path to the script:
Chapter 7. System 87
DRAFT - NOT FOR PUBLICATION
88 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
keystore which only contains public keys that needs to be created. Use the SSL Certificates page
to create this keystore and to import the appropriate certificate.
Certificate Store
Choose the keystore which contains the certificate that will be used to communicate with the
server.
Service name
Specify the name of the Oracle instance on the external server. Contact your Oracle database
administrator for this information.
9. Click Save.
10. Deploy the changes.
Results
The appliance is configured to use the runtime database that is deployed on the external system.
General Information
HVDB data is language agnostic. Character support might not be an issue with regards to the installation
that is chosen.
Oracle DB_BLOCK_SIZE or PAGE_SIZE can vary based on deployments but it is suggested to have at
least 16384.
The suggested character set is ALUTF8.
User permissions for database must have read-write access and the ability to execute the commands in
the SQL script.
Oracle:
DB2:
What to do next
• Tune the external database by setting the configuration parameters. See Runtime database tuning
parameters.
• On Oracle 12.2 check that the supported login protocol is set on the DBMS. If it is not, set the value
SQLNET.ALLOWED_LOGON_VERSION=11 in the sqlnet.ora file. For more information, see https://
docs.oracle.com/en/database/oracle/oracle-database/12.2/upgrd/required-tasks-complete-
upgrading-oracle-database.html#GUID-12B920E9-B2DA-48A0-832C-3E07D172A011
Chapter 7. System 89
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > Network Settings > DCS Configuration.
2. Specify the general settings.
Worker Threads
The number of worker threads that are allocated to processing requests.
Maximum Session Lifetime
The maximum lifetime (in seconds) of any session that is stored by the DSC.
Client Grace Period
The length of time (in seconds) that a client (aka Web Reverse Proxy) has to reconnect before
sessions that are owned by that client are discarded.
Connection idle timeout
The maximum length of time that a connection from a client can remain idle before it is closed by
the server. A value of 0 indicates that connections will not be reused. The default value is 0.
Service Port
The port number on which the DSC will listen for requests.
Replication Port
The port number on which the DSC will listen for requests from replicated DSC servers.
3. Specify the external connection settings. This data is used when configuring the DSC clients (aka Web
Reverse Proxy and administration client). It corresponds to the host identifier and port used to connect
to the replication and session services of the various DSC servers. For failover purposes, up to 4 DSC
servers can be configured (primary, secondary, tertiary, and quaternary).
Address
The IP address or resolvable host name over which clients can connect to the DSC.
Service Port
The port that can be used by clients to connect to the DSC for session requests. This port can be
different to the configured Service Port under general settings due to the port mapping capability
of Docker.
Replication Port
The port that a DSC server should use when connecting to a replicated DSC server. This port can
be different to the configured Replication Port under general settings due to the port mapping
capability of Docker.
4. Click Save.
Procedure
1. From the top menu, select System > Network Settings > Database Configuration.
90 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 7. System 91
DRAFT - NOT FOR PUBLICATION
be imported into the lmi_trust_store and rt_profile_keys key files. Use the SSL
Certificates page to import the appropriate certificate.
Database name
The name of the database instance on the external PostgreSQL server.
3. Click Save.
System settings
Information about managing system settings on your appliance.
Procedure
1. Click System > System Settings > Date/Time
2. Configure the following options:
Option Description
Time Zone Specifies the time zone for the appliance.
Date/Time Specifies the day, month, year, and time for the
appliance.
NTP Server address Lists the NTP (NIST Internet Time Service)
servers the appliance uses. You can enter
multiple NTP servers, separated by commas.
3. Click Save.
Procedure
1. Click System > System Settings > Administrator Settings.
The available tuning parameters are listed in a table.
2. Modify the parameters.
• To edit a parameter, select the parameter from the table and click Edit. In the edit window, change
the parameter value.
Note: If you edit the SSHD port parameter in a clustered environment, all machines in the cluster
must be configured with the same SSHD port. As the configured port will not be automatically
distributed across all machines in the cluster, each machine must be updated individually.
• To delete the current settings for a parameter and change its value to unset, select the parameter
from the table and click Delete.
Note: The administrator password cannot be reset.
For example, to configure the maximum size or maximum number of the trace.log, messages.log
files, and their rollover files, modify the Maximum Log File Size or Maximum Log Files parameters.
The Maximum Log File Size parameter defines the maximum size in megabytes that the log files can
92 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
grow to before they are rolled over. The Maximum Log Files parameter defines the maximum number
of log files and rollover files that can be kept on the system.
a. Select Maximum Log File Size or Maximum Log Files.
b. Click Edit.
c. Enter the values as needed.
d. Click OK.
3. Deploy the changes.
Procedure
1. Select System > System Settings > Administrator Settings.
2. Click LMI Tracing.
The LMI tracing components and trace levels are displayed.
Chapter 7. System 93
DRAFT - NOT FOR PUBLICATION
94 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > System Settings > Management Authentication.
All current management authentication settings are displayed.
Chapter 7. System 95
DRAFT - NOT FOR PUBLICATION
96 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 7. System 97
DRAFT - NOT FOR PUBLICATION
Procedure
1. Select System > System Settings > Management Authorization.
2. Under Roles, select the Enable Authorization Roles check box.
98 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 7. System 99
DRAFT - NOT FOR PUBLICATION
100 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
effective immediately. It is possible for the user to continue performing web service calls with their
original credentials until the authentication cache is refreshed.
Procedure
1. From the top menu, select System > System Settings > Account Management.
2. Select the User or Group link.
3. Follow the prompts to complete the action you want to take.
Chapter 7. System 101
DRAFT - NOT FOR PUBLICATION
102 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 7. System 103
DRAFT - NOT FOR PUBLICATION
Managing snapshots
Use snapshots to restore prior configuration and policy settings to the appliance. Back up the appliance
on a frequent basis by downloading snapshot files.
Procedure
1. Click System > System Settings > Snapshots.
2. In the Snapshots pane, use one or more of the following commands:
Option Description
New To create a snapshot, click New, type a comment
that describes the snapshot, and then click Save.
Edit To edit the comment for a snapshot, select the
snapshot, click Edit, type a new comment, and
then click Save.
Delete To delete snapshots, select one or more
snapshots, and then click Delete.
Apply To apply a snapshot, select the snapshot, and
then click Apply.
Note: The password of the 'admin' user is not
contained in a snapshot. Therefore the password
of the 'admin' user will remain unchanged after
the application of a snapshot.
Chapter 7. System 105
DRAFT - NOT FOR PUBLICATION
Procedure
1. Click System > System Settings > Support Files.
2. In the Support Files pane, use one or more of the following commands:
Option Description
New To create a support file, click New, select the
categories and instances to include in the
support file, optionally enter a comment that
describes the support file, and then click Save
Configuration. A new support file is created on
the appliance.
Edit To edit the comment for a support file, select the
support file, click Edit, type a new comment, and
then click Save.
Delete To delete a support file, select the support file,
and then click Delete.
Download To download support files, select the support
files, click Download, browse to the drive where
you want to save the support files, and then click
Save.
Note: If you download multiple support files, the
files are compressed into a .zip file.
Procedure
1. Click System > System Settings > System Alerts.
106 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
2. In the System Alerts pane, complete one or more of the following tasks:
• To receive notifications for problems with the system, select one or more system alert objects from
the Available Objects pane, and add them.
• To create or edit alert objects, see these related topics to configure one or more of the following
alert objects:
– “Configuring email alert objects” on page 108
– “Configuring remote syslog alert objects” on page 108
– “Configuring SNMP alert objects” on page 107
• To delete a system alert, select the alert and then click Delete.
Procedure
1. Click System > System Settings > System Alerts.
2. In the System Alerts page, take one of the following actions:
• Click New > SNMP.
• Select an existing object, and then click Edit.
3. Type a name for the alert object.
4. Select a trap version from the list.
5. In the SNMP Manager box, type the IP address, host name, or fully qualified domain name (FQDN) of
the SNMP manager.
Note: The SNMP host must be accessible to the appliance to send SNMP traps.
6. Type the port number that the SNMP manager monitors for notifications.
Note: The default port number is 162.
7. Type a comment to describe the SNMP alert object.
8. For trap versions V1 or V2c, type the name of the community that is used to authenticate with the
SNMP agent.
9. For trap version 3, configure the following options:
Option Description
Name Type the user name to be authenticated in the
SNMP database.
Notification Type On the Notification Type tab, select Inform or
Trap in the SNMP Trap Version field.
Authentication On the Authentication and Privacy tab, select
Enabled to enable authentication, type the
authentication passphrase, and then select an
authentication type.
Privacy Select Enabled to enable privacy, type the
privacy passphrase, and then select a privacy
type.
10. Click Save.
Chapter 7. System 107
DRAFT - NOT FOR PUBLICATION
Procedure
1. Click System > System Settings > System Alerts.
2. In System Alerts page, take one of the following actions:
• Click New > Email.
• Select an existing object, and then click Edit.
3. Configure the following options:
Option Description
Name Specifies a meaningful name for the response.
Note: This name displays when you select
responses for events, so give the response a
name that allows users to easily identify what
they are selecting.
Procedure
1. Click System > System Settings > System Alerts.
2. In the System Alerts page, do one of the following steps:
• Click New > Remote Syslog.
• Select an existing remote syslog alert object, and then click Edit.
3. Configure the following options:
Option Description
Name Specifies a meaningful name for the response.
108 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Option Description
Remote Syslog Collector Specifies the fully qualified domain name or IP
address of the host on which you want to save the
log.
Note: The host must be accessible to the
appliance.
Remote Syslog Collector Port Specifies the custom port that is used to connect
to the syslog collector. The default is 514.
Comment Type a comment to identify the remote syslog
alert object.
4. Click Save.
Object Types
<object type> corresponds to the type of System Alert object. A list of the mechanisms and their
types follows:
Mechanism <type>
Event log logdb
SNMP snmp
Email email
Remote Syslog syslog
Note: Event Log refers to the default mechanism, which is used to populate the System Events that
is seen on the Event Log page in the Local Management Interface and the System Events Log REST
APIs.
Object Instances
<object instance> refers to the UUID of a specific alert object instance. This can be used to mute
events for just a particular System Alert object instance rather than for all objects of a given type.
The <object instance> can be discovered by using the REST APIs. Refer to Manage: System
Settings > System Settings > System Alerts > Event Log within the Web Services documentation.
Patterns
<patterns> are a list of space separated event IDs or patterns which should be ignored.
Each pattern can be either one of the following:
1. A literal event ID. For example, GLGPL1002I
2. A regular expression pattern. For example, (.*)I or GLG(.*)
Examples
To mute the events GLGSY0102I and GLGPL1001I on an SNMP alert object with the UUID
2a6cc325-2d98-4747-85f0-8d7bcac4daec:
Chapter 7. System 109
DRAFT - NOT FOR PUBLICATION
To mute all informational events (events which end with an I character) and GLGAU0003W (user failed to
login) on all SNMP alert objects:
To mute all events related to snapshots (events which begin with GLGSS) on the System Event Log:
For more information on Event IDs and their meaning, see Appliance Messages and Events that are
generated by the events framework.
Procedure
1. Click System > System Settings > Restart or Shut down
2. Perform one of the following tasks:
Option Description
Click Restart to restart the appliance Restarting the appliance takes it offline for
several minutes.
Click Shut down to turn off the appliance Shutting down the appliance takes it offline and
makes it inaccessible over the network until you
restart it.
3. Click Yes.
Procedure
1. Click System > Updates and Licensing > Application Database Settings.
110 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Chapter 7. System 111
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > System Settings > Application Locale.
2. Select the language that you want the application log files to be written in.
3. Click Save.
112 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Manage System Settings > System Settings > SNMP Monitoring.
2. Type the port number that the SNMP agent must listen on in the Port field.
Note: The default port number is 161.
3. Select the SNMP Protocol that the agent must use.
• SNMPv1/SNMPv2c
Type the name of the community that the SNMP uses to authenticate with the SNMP agent.
• SNMPv3
Configure the following options to describe the user who accesses the SNMP agent.
Security Level
Select the security level of the user.
User Name
Type the name of the user who accesses the SNMP agent.
Auth Protocol
Select the authentication protocol to use.
Auth Password
Type the password to use for authentication.
Confirm Auth Password
Type the password to use for authentication.
Priv Protocol
Select the privacy protocol to use.
Priv Password
Type the password to be used as a privacy passphrase.
Confirm Priv Password
Type the password to be used as a privacy passphrase.
4. Click Save.
For IBM Security Verify Access environments established on earlier versions, password quality checking is
not performed unless the password.policy tuning parameter is added manually.
Chapter 7. System 113
DRAFT - NOT FOR PUBLICATION
Supported options
The following options from the pam_pw quality module can be used when authoring a password policy:
• minlen
• dcredit
• ucredit
• lcredit
• ocredit
• minclass
• maxrepeat
• maxclassrepeat
Note: Dictionary-based checking is not supported.
Secure settings
Information about managing secure settings on your appliance.
Procedure
1. Log in to the local management interface.
114 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. You can view all current certificate database names and their last modified time information.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database that you want to describe.
3. Select Manage > Describe.
4. In the Describe SSL Certificates Database window, enter the description of the certificate database.
5. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 38.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. From the menu bar, click New.
3. On the Create SSL Certificate Database page, enter the name of the certificate database that you
want to create. The name of the certificate database name must be unique.
4. Select the type of the certificate database.
• If you select Local as the type, you can go to Step 5.
• If you select Network as the type, complete the following fields:
a. On the Main tab, fill in the Token Label and Passcode fields.
b. Select the HSM type.
– If you select nCipher nShield Connect as the HSM type, complete the following fields:
1) On the HSM tab, the HSM IP Address field for the primary HSM device is required. The
rest of the fields are optional. You can also provide details of a secondary HSM device. The
secondary device can be used for load balancing and failover.
2) On the RFS tab, if you select Automatic, enter the address of the remote file system that
stores the key files. The rest of the fields are optional. If you select Manual Upload, click
Chapter 7. System 115
DRAFT - NOT FOR PUBLICATION
Browse to select the zip file that contains the required key files. The contents of the zip file
will be extracted and stored on the local file system.
Note:
- The nCipher nShield Connect integration is only available if you first install
the 'IBM Security Verify Access nCipher nShield Connect HSM Extension'. This
extension is available for download from the IBM Security App Exchange (https://
exchange.xforce.ibmcloud.com/hub/IdentityandAccess).
- If the files in the remote file system are changed and you selected the Manual Upload
option, you must manually upload an updated zip file. The updated zip file overwrites
existing file entries but does not delete "missing" file entries.
– If you select SafeNet Luna SA as the HSM type, complete the IP Address and Admin
Password fields on the SafeNet tab.
Note: The SafeNet integration is only available if you first install the 'IBM Security Verify
Access SafeNet Luna Network HSM Extension'. This extension is available for download
from the IBM Security App Exchange (https://exchange.xforce.ibmcloud.com/hub/
IdentityandAccess). You can then use the appliance to manage the certificates that are
contained on the HSM device. However, some operations, such as certificate extract, are not
supported.
5. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 38.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database that you want to rename.
3. Select Manage > Rename
4. In the Rename SSL Certificates Database window, enter the new name of the certificate database. The
new name of the certificate database name must be unique.
5. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 38.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select Manage > Import.
3. Click Browse under Certificate Database File.
4. Browse to the directory that contains the file to be imported and select the file. Click Open.
5. Click Browse under Stash File.
6. Browse to the directory that contains the file to be imported and select the file. Click Open.
116 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
7. Click Import.
A message that indicates successful import is displayed.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 38.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database that you want to export.
3. Select Manage > Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow pop-up
windows for the appliance before files can be exported.
4. Confirm the save operation when the browser prompts you to save the .zip file.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database that you want to delete.
3. Select Delete
4. In the window that pops up, click Yes.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 38.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Click Replicate with Cluster to have the certificate databases automatically replicated across the
cluster.
Note: This option is available only if the current appliance is the primary master of a cluster. If this
option is selected, you cannot modify the certificate databases on any appliance other than the
primary master.
Chapter 7. System 117
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database of interest.
3. Select Manage > Edit SSL Certificate Database.
118 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
4. All signer certificate names are displayed on the Signer Certificates tab.
Import a signer certificate
a. Click Manage > Import.
b. Click Browse. Then, select the signer certificate to be imported.
c. In the Certificate Label field, enter what you want to label the signer certificate.
d. Click Import.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 38.
View and export a signer certificate
a. Select the signer certificate that you want to view.
b. Click Manage > View. The content of the signer certificate is displayed in the browser.
c. Optional: Click Export. Then, confirm the save operation in the window that pops up.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
Export a signer certificate
a. Select the signer certificate that you want to export.
b. Click Manage > Export.
c. Confirm the save operation in the browser window that pops up.
Delete a signer certificate
a. Select the signer certificate that you want to delete.
b. Click Delete.
c. In the window that pops up, click Yes.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 38.
Load a signer certificate from a server
Use the Load function to retrieve a server certificate from the specified server and port, and then
install this certificate into the keyfile as a signer certificate with a specific label.
a. Click Manage > Load.
b. In the Load Signer Certificate window, specify the following fields:
Server
The server name from which to load the certificate.
Port
The port from which to load the certificate.
Certificate Label
The name to give to the certificate.
c. Click Load.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database of interest.
Chapter 7. System 119
DRAFT - NOT FOR PUBLICATION
120 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
4. Click the Personal Certificates tab. All personal certificate names are displayed on this tab.
Note: If the Issuer or Subject field contains characters in a language other than English, these
characters might be displayed in the panel as encoded characters.
Import a personal certificate
a. Click Manage > Import.
b. Click Browse. Then, select the file that contains the personal certificate to import.
Note: Any PKCS 12 file to be imported must have the file extension .p12 for the import
operation to be successful.
c. Optional: Specify the password for the file that contains the personal certificate to import.
d. Click Import.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 38.
Receive a personal certificate
Note: A personal certificate can be received only if a corresponding certificate request exists.
a. Click Manage > Recieve.
b. Click Browse. Then, select the personal certificate to be received.
c. Select the Default check box if you want to set the personal certificate as default.
d. Click Receive.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 38.
View a personal certificate
a. Select the personal certificate you want to view.
b. Click Manage > View. The content of the personal certificate is displayed in the browser.
c. Optional: Click Export. Then, confirm the save operation in the window that pops up.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
Export a personal certificate
a. Select the personal certificate that you want to export.
b. Click Manage > Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
c. Confirm the save operation in the browser window that pops up.
Extract a personal certificate
Note: The Extract option is used to export a single certificate and its private key (if one exists)
from the current key database to a new pcks12 formatted key database.
a. Select the personal certificate that you want to extract.
b. Click Manage > Extract.
c. In the Extract Personal Certificate window, enter a password for the extracted certificate
container and confirm the password.
d. Click Extract.
Note: You might want to save the certificate with the .p12 file extension for later use. Any
PKCS 12 file to be imported must have the file extension .p12 for the import operation to be
successful.
Chapter 7. System 121
DRAFT - NOT FOR PUBLICATION
S= and ST= might be used for specifying state. However, the certificate or the certificate
request always uses ST= .
Any error in the distinguished name results in Error box with CTGSK3024W Invalid value
for parameter "-dn" (<entered dn-value>) on save
c. Optionally, select an entry from the Signature Algorithm list. If this option is not specified, the
default signature algorithm is used.
d. Select the Default check box if you want to set this personal certificate as the default
certificate.
e. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 38.
Set a personal certificate as default
a. Select the personal certificate that you want to edit.
b. Click Edit.
c. Select the Set as the Default Certificate check box to set the personal certificate as the default
certificate.
d. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 38.
Procedure
1. From the top menu, select System > Secure Settings > SSL Certificates.
2. Select the certificate database of interest.
3. Select Manage > Edit SSL Certificate Database.
122 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
4. Click the Certificate Requests tab. All certificate request names are displayed on this tab.
Create a certificate request
a. Click New.
b. Enter Certificate Request Label, Certificate Request Distinguished Name, and Key Size.
A distinguished name must be in the following format:
S= and ST= might be used for specifying state. However, the certificate or the certificate
request always uses ST= .
Any error in the distinguished name results in Error box with CTGSK3024W Invalid value
for parameter "-dn" (<entered dn-value>) on save
c. Optionally, select an entry from the Signature Algorithm list. If this option is not specified, the
default signature algorithm is used.
d. Click Save.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 38.
View and export a certificate request
a. Select the certificate request that you want to view.
b. Click Manage > View. The content of the certificate request is displayed in the browser.
c. Optional: Click Export. Then, confirm the save operation in the window that pops up.
Export a certificate request
a. Select the certificate request that you want to export.
b. Click Manage > Export. The content of the certificate request is displayed in the browser.
c. Confirm the save operation in the window that pops up.
Delete a certificate request
a. Select the certificate request that you want to delete.
b. Click Delete.
c. In the window that pops up, click Yes.
Note: For the changes to take effect, they must be deployed as described in “Configuration
changes commit process” on page 38.
Chapter 7. System 123
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select System > Secure Settings > File Downloads.
The displayed directories contain the files that can be downloaded. There are three parent directories:
• access_control contains files specific to the IBM Security Verify Access Advanced Access Control
offering.
Note: This directory is shown only if Advanced Access Control has been activated.
• common contains files that are common across Security Verify Access.
• isva contains files specific to IBM Security Verify Access base offering..
Note: This directory is shown only if the base has been activated.
• federation contains files specific to the IBM Security Verify Access Federation offering.
Note: This directory is shown only if Federation has been activated.
These parent directories might contain sub-directories for different categories of files.
2. Optional: Click Refresh to get the most up-to-date data.
3. Select the file of interest.
4. Click Export to save the file to your local drive.
Note: You must configure the software that blocks pop-up windows in your browser to allow pop-up
windows for the appliance before files can be downloaded.
5. Confirm the save operation in the browser window that pops up.
124 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Docker principles
Security Verify Access Docker support was implemented with the following Docker principles in mind.
• Containers are supposed to be ephemeral.
Design them in a way that you can stop and destroy an old container and build a new one with an
absolute minimum of set-up and configuration.
• Minimize the images.
To reduce complexity, dependencies, file sizes, and build times, avoid installing extra or unnecessary
packages. For example, do not include a text editor in a database image.
• Single service.
Decoupling applications into multiple containers makes it much easier to scale horizontally and reuse
containers. For instance, a web application stack might consist of three separate containers, each with
its own unique image to manage the web application, database, and an in-memory cache in a decoupled
manner.
These principles are guidelines from Docker. For more information, see the Best practices for writing
Dockerfiles topic on the Docker website.
Docker terms
The following paragraphs explains some of the common Docker terms used throughout this document.
Image
Docker images are the basis of containers. An Image is an ordered collection of root filesystem
changes and the corresponding execution parameters for use within a container runtime. An image
typically contains a union of layered file systems stacked on top of each other. An image does not have
state and it never changes.
DRAFT - NOT FOR PUBLICATION
Container
A container is a runtime instance of a Docker image. A Docker container consists of:
• A Docker image
• An execution environment
• A standard set of instructions
Volume
A volume is a specially-designated directory within one or more containers that bypasses the Union
File System. Volumes are designed to persist data, independent of the container's life cycle. For more
details, see https://docs.docker.com/engine/tutorials/dockervolumes/.
For more Docker terms, see the Docker Glossary page on the Docker website.
Docker networking
The Docker host manages the networking of the Docker containers. Docker containers that reside on
the same Docker host can communicate with each other using the internal Docker network. If a Docker
container wishes to expose a service (or port) to machines that are not located on the same Docker host,
they need to utilize the port mapping capabilities of the Docker host. This capability allows a port from the
Docker container to be mapped to a port on the Docker host.
You expose ports using the EXPOSE keyword in the Dockerfile or the --expose flag to docker run.
Exposing ports is a way of documenting which ports are used, but does not actually map or open any
ports. Exposing ports is optional.
You publish ports using the PUBLISH keyword in the Dockerfile or the --publish flag to docker run.
This tells Docker which ports to open on the container’s network interface. When a port is published, it is
mapped to an available high-order port (higher than 30000) on the host machine, unless you specify the
port to map to on the host machine at runtime. You cannot specify the port to map to on the host machine
in a Dockerfile, because there is no way to guarantee that the port will be available on the host machine
where you run the image.
For more information about Docker networking, see the Docker container networking topic on the Docker
website.
126 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
When Security Verify Access runs in a Docker environment, each container provides a single service, such
as configuration, Web Reverse Proxy instance, runtime profile (also known as Advanced Access Control/
Federation), and Distributed Session Cache (DSC). The Security Verify Access Image can run as any one of
these four containers (shown in green boxes).
The environment also requires an external user registry and database for runtime (for example, DB2,
Oracle). The runtime database is required only if you use the Advanced Access Control or Federation
capabilities. The external user registry is always required. IBM provides some extensions to third party
images that can be used to provide these services. These images (ibmcom/verify-access-openldap
and ibmcom/verify-access-postgresql) are available for download from Docker Hub.
The configuration container is used as a tool to generate the configuration data. The configuration data is
shared with the runtime containers through one of the following methods:
• Using a shared volume that has been mounted to the "/var/shared" directory in the container.
• Manually copying the snapshot to the correct location using the Docker
commands (the default snapshot file name is: "/var/shared/snapshots/
isva_<release_number>_published.snapshot", for example "/var/shared/snapshots/
isva_10.0.0.0_published.snapshot").
• Using the configuration service that has been exposed from the Security Verify Access configuration
container. See “Configuration service” on page 130.
Images that include all the necessary services to run Security Verify Access in a Docker environment are
provided for download.
128 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
For example, to specify that the container acts as the primary, use INSTANCE = '1'. To specify
that the container acts as the secondary, use INSTANCE = '2'.
SERVICE
The service that the container will provide. If no service is specified, the container will default to
"config". Valid values are: config, webseal, dsc, and runtime.
SNAPSHOT
The name of the configuration data snapshot that is to be used when starting the container. This will
default to the latest published configuration.
FIXPACKS
A space-separated ordered list of fix packs to be applied when starting the container. If this
environment variable is not present, any fix packs present in the fixpacks directory of the
configuration volume will be applied in alphanumeric order.
CONFIG_SERVICE_URL
The URL that will be used to access the published configuration/fix-pack data. If using the
configuration service of the Security Verify Access configuration container, the URL would be of the
format: https://<container-ip>:<mapped port>/shared_volume. A BA header will be
supplied to handle authentication to the configuration service.
Note: This environment variable is ignored by the configuration container.
CONFIG_SERVICE_USER_NAME
The user that will be used when accessing the configuration service.
Note: This environment variable is ignored by the configuration container.
CONFIG_SERVICE_USER_PWD
The password for the user that will be used when accessing the configuration service.
Note: This environment variable is ignored by the configuration container.
ADMIN_PWD
The initial seeded password for the built in 'admin' user that is used when accessing the
configuration service. If this parameter is not specified the default password 'admin' is used.
Note: This environment variable is not available prior to version 9.0.5.0.
AUTO_RELOAD_FREQUENCY
The frequency, in seconds, that the container will check to see if the configuration has been
updated. If an updated configuration is detected, the container will automatically reload the
configuration data. Note that there will be a service interruption while the reload takes place.
If this environment variable is missing, the container will not attempt any automatic reload of
configuration data. This environment variable is ignored in the configuration container.
USE_CONTAINER_LOG_DIR
This environment variable, if set to any value, is used to indicate that the log files should be written
to a container specific logging directory (underneath the '/var/application.logs' path). This
allows multiple container replicas to write log information to the same persistent volume. An
alternative, in a Kubernetes environment, is to deploy the containers in a 'StatefulSet'. See the
official Kubernetes documentation for information on StatefulSets.
Note: This environment variable is not available prior to version 10.0.0.0
Consider the following points regarding user registry support when you use Security Verify Access in a
Docker environment.
• The embedded user registry can only be used to house the secAuthority=Default
suffix in conjunction with basic users. If full Security Verify Access users are required, the
secAuthority=Default suffix must be stored in an external user registry.
• An external user registry is always required for the user suffix. Configure the external user registry as a
federated user registry if the embedded user registry is being used for the secAuthority=Default
suffix.
Configuration service
All configuration must be completed using the configuration container. The configuration service supports
a scaled-down version of the LMI. You can use this LMI to manage the configuration data.
Note: To make a configuration available to a runtime container, you must click the Publish configuration
button in the LMI.
The management service (i.e. the LMI) always listens on port 9443 of the container.
Restrictions
Security Verify Access, when run in a Docker environment, has the following restrictions:
• Any configuration changes require the service containers to be reloaded. You can use the CLI to trigger
a manual reload. Changes to the Federation configuration and the policy database will not result in
any service down time. Changes to junction definitions and Web Reverse Proxy configuration will
result in minimal service down time while the Web Reverse Proxy is restarted. See “CLI in a Docker
environment” on page 155.
• The authorization server (i.e. pdacld) is not supported.
130 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
• The front-end load balancer capability of the Security Verify Access appliance is not supported.
• The IP reputation policy information point (PIP) capability of Advanced Access Control is not supported.
• Network HSM devices are not supported. All keys are stored locally.
• A sample geo-location database is not provided. If a sample geo-location database is required, it should
be obtained from the downloads area of a running virtual or hardware appliance. See Updating location
attributes.
• Pre-installed federation partner templates are not provided. See Managing federation partner
templates. The connector package is available from the IBM Security App Exchange site (https://
www.ibm.com/security/community/app-exchange) as the ‘IBM Security Access Manager Extension for
SAML Connectors’ package.
• Web Reverse proxy flow data or PAM statistics are not supported.
• The embedded user registry can only be used to hold static data and should not be used to hold any
user data. As a result the embedded user registry should only be used in conjunction with a federated
registry, to store the user data, and basic users. The Security Verify Access integration component of the
SCIM support will not be available if the embedded user registry is in use.
• Authentication using RSA SecurID tokens is not supported.
• The container cannot be executed from within a Docker user namespace.
present, any fix packs present in the fixpacks directory of the configuration volume will be applied
in alphanumeric order.
To manage fix packs, you can either access the Docker volume manually, or use the System >
Network Settings > Shared Volume page of the configuration container LMI. On the Shared Volume
page, you can view the contents of the fixpacks directory of the configuration volume, upload,
delete, or rename fix packs.
The System > Updates and Licensing > Fixpack LMI page is read-only in a Docker environment. You
can use that page to see which fix packs have been applied, but cannot use it to apply or roll back fix
packs.
Log files
By default, Docker uses a layered file system to help reduce the disk space utilization of the Docker
containers. However, this file system has slower write speeds than standard file systems. As such, a
standard Docker practice is to place any files that are updated frequently (for example, log files) on a
shared volume. All of the log files that are used by Security Verify Access are located in the '/var/
application.logs' directory. Therefore the recommended approach is to create this directory as a
shared volume when you create your container.
You can view the log files through the Monitor > Application Log Files panel of the LMI.
Multiple containers should not reference the same persistent volume for log storage, otherwise multiple
containers will attempt to write to the same log file at the same time, causing data write and integrity
issues. In a Kubernetes environment this problem can be overcome by deploying the containers in a
StatefulSet (refer to the official Kubernetes documentation for information on StatefulSets). An alternative
is to set the USE_CONTAINER_LOG_DIR environment variable in the container. When this variable is set
the log files are written to a container specific log sub-directory. This environment variable is not available
prior to version 10.0.0.
Note: In IBM Security Verify Access version 9.0.7.0 a container specific log sub-directory is always used.
The log file directory structure is shown in the following table.
132 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
The other option is to access the logs with the Web services on the configuration and the runtime
containers. By invoking the corresponding "Application Logs" API on each container, the user can list and
retrieve the log files on that container. See the Docker Web Services documentation for more information.
Note: The recommended approach is to configure Security Verify Access to send the log files to a remote
syslog server wherever possible.
Usage
Quick start
To start a container with the defaults, execute the command:
However, a more complete command, which would specify the volumes, ports and standard environment
variables, could be:
--env POSTGRES_SSL_CN=isva.postgresql \
ibmcom/verify-access-postgresql:latest
Security
By default the image will automatically generate a TLS certificate when the container is first started.
The CN for the certificate is obtained from the POSTGRES_SSL_CN environment variable (if defined),
otherwise it will be obtained from the container hostname. The generated public key will be saved to the
'${PGDATA}/public.pem' file within the container.
If you want to enable unsecure communication with the database server the POSTGRES_UNSECURE
environment variable should be set to 'true'.
If you want to provide your own certificate the public certificate and private key should be placed into
a single file (without password protection) and made available to the container during initialization.
The location of the key file within the container is defined by the POSTGRES_SSL_KEYDB environment
variable.
If you want to create your own self-signed server certificate, you can do so using OpenSSL. For example:
User ID
By default the container runs as the 'postgres' (uid: 70) user. If a volume is being used to persist
the database, the 'postgres' user must be granted write permission to the volume. In a Kubernetes
environment this can be achieved by setting the fsGroup field in the deployment yaml file.
License
The Dockerfile and associated scripts are licensed under the Apache License 2.0 license.
Community support
If you are a licensed IBM customer, you can request support through the official IBM support channel.
However, IBM does not provide support for the official postgres Docker image.
Community support is also available for this image via the DeveloperWorks communities. Both
DeveloperWorks Answers and the DeveloperWorks IBM Security Identity and Access Management Forum
are vibrant communities.
Supported tags
Table 15. Supported tags
Tag Purpose
latest The latest stable version.
V.R.M.F A particular release, of the format: {version}.{release}.
{modfication}.{fixpack}. For example, 10.0.0.0
Related information
134 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Points to note
Some additional points to note about the extensions to the osixia/openldap Docker image include:
• The secAuthority=Default suffix is stored in the "/var/lib/ldap.secAuthority" directory
and so this should be added to the list of volumes of the osixia/openldap container.
• Using the osixia/openldap-backup Docker container to back-up the user registry is not supported.
• The secAuthority=Default suffix will contain the "cn=root,secAuthority=Default"
administrative user. The password for the user will be set to the same value as the admin user of the
osixia/penldap container (controlled by the LDAP_ADMIN_PASSWORD variable).
• The user suffix is automatically determined from the LDAP_DOMAIN entry, where each element in
the domain name is preceded by "dc". For example, if the LDAP_DOMAIN is set to ibm.com, the
corresponding suffix will be "dc=ibm,dc=com".
• The default value of the LDAP_TLS_VERIFY_CLIENT environment variable has been changed from
'required' to 'never'.
• By default, the LDAP server will only listen on the LDAPS secure port (636) and will not listen on the
LDAP unsecure port (389).
Usage
Quick start
To start a container with the defaults, execute the command:
However, a more complete command, which would specify the volumes, ports and standard environment
variables, could be:
--env LDAP_CONFIG_PASSWORD=passw0rd \
ibmcom/verify-access-openldap:latest
TLS
By default, the image will automatically generate a TLS certificate when the container is first started. The
CN for the certificate is obtained from the container hostname.
If you want to provide your own certificates, they should be made available to the container at
initialization within the /container/service/slapd/assets/certs directory. The following files
reside within this directory:
If you want to create your own self-signed server certificate, you can do so using OpenSSL. For example:
License
The Dockerfile and associated scripts are licensed under the Apache License 2.0 license.
OpenShift
To run this container with OpenShift, the service account must be allowed to run processes with elevated
privileges. The 'anyuid' scc provides sufficient permission to run the ibmcom/verify-access-
openldap image. An example service account is:
oc create sa openldap
oc adm policy add-scc-to-user anyuid –z opendlap
apiVersion: apps/v1
kind: Deployment
spec:
template:
spec:
serviceAccountName: openldap
containers:
. . .
Community support
If you are a licensed IBM customer, you can request support through the official IBM support channel.
However, IBM does not provide support for the official osixia/openldap Docker image.
136 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Community support is also available for this image via the DeveloperWorks communities. Both
DeveloperWorks Answers and the DeveloperWorks IBM Security Identity and Access Management Forum
are vibrant communities.
Supported tags
Table 18. Supported tags
Tag Purpose
latest The latest stable version.
V.R.M.F A particular release, of the format: {version}.{release}.
{modfication}.{fixpack}. For example, 10.0.0.0
Related information
Scenarios
These scenarios illustrate some of the typical situations an administrator encounters when using Security
Verify Access in Docker environment and what actions the administrator can take in such situations.
Scenario - Upgrade
The security administrator currently has Security Verify Access running in a docker environment. A new
version of Security Verify Access has just been released and so the administrator wants to upgrade the
environment to this latest version.
The administrator completes the following steps.
1. Pull the latest Security Verify Access image from Docker Hub.
2. Start a new configuration container using the latest Security Verify Access image.
• When the image starts, it will automatically convert the data found in the configuration volume to the
latest version.
• The legacy data files will continue to exist so that Security Verify Access containers which are
running the older version of Security Verify Access can continue to operate.
3. Start each service, one at a time, using the latest Security Verify Access image.
• As each new service is started, stop the corresponding service that is running the older version of the
image.
• The services from the old version and services from the new version can co-exist in the environment.
However, configuration changes to the services from the old version must be made using a
configuration container also at the old version.
138 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
container to use the AAC/Federation features, such as configuring the authentication service and OAuth
authentication.
The administrator completes the following steps.
1. Ensure that the database server is running. One option would be to use the ibmcom/verify-
access-postgresql image that is available for download from Docker Hub.
2. Log on to the LMI of the configuration container.
3. Go to System > Network Settings > Database Configuration.
4. Configure the database settings.
5. Go to System > Updates and Licensing > Overview.
6. Activate the AAC/Federation module with the corresponding activation code.
7. Deploy the changes.
8. Start the AAC/Federation runtime container.
Note: When you run the AAC Auto Configuration Tool, use the configuration container’s address and port
for the Security Verify Access appliance LMI hostname and port, and the AAC LMI hostname and port
arguments. Use the AAC runtime container’s address and port (port 80 or 443 by default) for the AAC
runtime listening interface hostname and port arguments.
Orchestration
As each Docker container provides a single service, multiple containers with dependencies among them
are usually required for a single environment. To simplify and automate the process, you can use Docker
orchestration tools to deploy Security Verify Access to a Docker environment.
The orchestration tools that have been validated against Security Verify Access include Kubernetes and
Docker Compose.
Kubernetes support
Kubernetes is an open-source system for automating deployment, scaling, and management of
containerized applications.
It provides features such as:
• Self-healing
• Horizontal scaling
• Service discover and load balancing
• Secret and configuration management
Further information on Kubernetes can be found on the official Kubernetes Web site: https://
kubernetes.io/.
Repository
The Security Verify Access image is available from the Docker Hub repository: 'ibmcom/verify-
access'.
Secrets
Sensitive information, like passwords should never be stored directly in the yaml deployment descriptors.
They should instead be stored within a Kubernetes secret and then the secret should be referenced in the
yaml deployment descriptors. Instructions on how to use Kubernetes secrets can be found in the official
Kubernetes documentation: https://kubernetes.io/docs/concepts/configuration/secret/
In the examples provided within this chapter, a ‘secret’ is used to store the Verify Access administration
password. An example command to create the ‘secret’ is provided below (ensure that the kubectl
context is set to the correct environment before running this command):
Service Accounts
Service accounts can be used to provide an identity for processes that run in a Pod. Information on the
usage of service accounts can be found in the official Kubernetes documentation: https://kubernetes.io/
docs/tasks/configure-pod-container/configure-service-account/.
In the examples that are provided within this chapter, the deployment descriptors use the ‘isva’ service
account. The kubectl utility can be used to create the ‘isva’ service account (ensure that the kubectl
context is set to the correct environment before running this command):
#
# The deployment description of the Verify Access configuration container. This
# container is used to manage the configuration of the Verify Access
# environment.
#
apiVersion: apps/v1
kind: Deployment
metadata:
name: isva-config
labels:
app: isva-config
spec:
selector:
matchLabels:
140 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
app: isva-config
template:
metadata:
labels:
app: isva-config
spec:
# The name of the service account which has the required
# capabilities enabled for the isva container.
serviceAccountName: isva
containers:
- name: isva-config
readinessProbe:
exec:
command:
- /sbin/health_check.sh
initialDelaySeconds: 10
periodSeconds: 10
---
#
# The service description of the Verify Access configuration service. The
# service is only accessible from within the Kubernetes cluster.
#
apiVersion: v1
kind: Service
metadata:
name: isva-config
spec:
ports:
- port: 9443
name: isva-config
selector:
app: isva-config
type: ClusterIP
4. You can monitor the bootstrapping of the container using the 'logs' command:
5. Start the Kubernetes proxy so that you are able to access the Web management console of the
configuration container. An alternative approach is to create a Kubernetes service that directly exposes
the LMI port of the configuration container.
#
# The deployment description of the Verify Access Web Reverse Proxy container.
#
apiVersion: apps/v1
kind: Deployment
metadata:
name: isva-wrp
labels:
app: isva-wrp
spec:
selector:
matchLabels:
app: isva-wrp
replicas: 1
template:
metadata:
labels:
app: isva-wrp
spec:
# The name of the service account which has the required
# capabilities enabled for the verify-access container.
serviceAccountName: isva
142 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
containers:
- name: isva-wrp
readinessProbe:
exec:
command:
- /sbin/health_check.sh
initialDelaySeconds: 10
periodSeconds: 10
kubectl exec -it `kubectl get -o json pods -l app=isva-wrp | jq -r .items[0].metadata.name` isva_cli
5. You can monitor the bootstrapping of the container using the 'logs' command:
6. Create a configuration file that is named wrp-service.yaml. This configuration file defines a
WebSEAL service that can be used to access WebSEAL. The type of service defined is different based
on whether the 'load balancer' service type is supported in the environment.
The following definition can be used if the 'load balancer' service type is not supported in your
environment:
#
# The service description of the Verify Access Web Reverse Proxy service. This is
# the entry point into the environment and can be accessed over port
# 30443 from outside of the Kubernetes cluster.
#
apiVersion: v1
kind: Service
metadata:
name: isva-wrp
spec:
ports:
- port: 443
name: isva-wrp
protocol: TCP
nodePort: 30443
selector:
app: isva-wrp
type: NodePort
The following definition can be used it the 'load balancer' service type is supported in your
environment:
8. a. If a 'LoadBalancer' service was defined, determine the external IP address of the service and
then use your browser to access WebSEAL (port 443):
b. If a 'NodePort' service was defined, determine the IP address of the Kubernetes cluster and then
use your browser to access WebSEAL (port 30443). In a 'minikube' environment the IP address
of the cluster can be obtained with the following command:
minikube ip
In an IBM cloud environment, the IP address of the cluster can be obtained with the following
command:
Runtime Container
The Verify Access Runtime Container (called isva-runtime, or Verify Access Liberty Runtime) is similar
to the Web Reverse Proxy Container. It is a personality of the verify-access image that runs the advanced
authentication, context-based access and federation services. The isva-runtime container also
retrieves a snapshot from the configuration container in the same manner as the Web Reverse Proxy
Container. Besides the technical function of the container, the difference is that this container has no need
to listen externally on a NodePort. Instead it only exposes its HTTPS interface on the cluster network with
the isva-runtime service.
The following steps illustrate how to create a runtime container:
1. Ensure that the kubectl context is set to the correct environment. The mechanism to do this differs,
based on the Kubernetes environment that is being used.
144 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
2. Create a configuration file that is named runtime-container.yaml. This configuration file defines a
runtime container that can be used to secure access to your Web applications:
#
# The deployment description of the Verify Access runtime profile container.
# This container provides the Federation and Advanced Access Control
# capabilities of Verify Access.
#
apiVersion: apps/v1
kind: Deployment
metadata:
name: isva-runtime
labels:
app: isva-runtime
spec:
selector:
matchLabels:
app: isva-runtime
replicas: 1
template:
metadata:
labels:
app: isva-runtime
spec:
# The name of the service account which has the required
# capabilities enabled for the isva container.
serviceAccountName: isva
containers:
- name: isva-runtime
readinessProbe:
exec:
command:
- /sbin/health_check.sh
initialDelaySeconds: 10
periodSeconds: 10
---
#
# The service description of the isva runtime profile service. The
# service is only accessible from within the Kubernetes cluster.
#
apiVersion: v1
kind: Service
metadata:
name: isva-runtime
spec:
ports:
- port: 443
name: isva-runtime
selector:
app: isva-runtime
type: ClusterIP
kubectl exec -it `kubectl get -o json pods -l app=isva-runtime | jq -r .items[0].metadata.name` isva_cli
5. You can monitor the bootstrapping of the container using the 'logs' command:
#
# The deployment description of the Verify Access distributed session cache
# container.
#
apiVersion: apps/v1
kind: Deployment
metadata:
name: isva-dsc
labels:
app: isva-dsc
spec:
selector:
matchLabels:
app: isva-dsc
template:
146 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
metadata:
labels:
app: isva-dsc
spec:
# The name of the service account which has the required
# capabilities enabled for the isva container.
serviceAccountName: isva
containers:
- name: isva-dsc
readinessProbe:
exec:
command:
- /sbin/health_check.sh
initialDelaySeconds: 10
periodSeconds: 10
---
#
# The service description of the verify-access distributed session cache
# service. The service is only accessible from within the Kubernetes
# cluster.
#
apiVersion: v1
kind: Service
metadata:
name: isva-dsc
spec:
ports:
- port: 443
name: isva-dsc
- port: 444
name: isva-dsc-replica
selector:
app: isva-dsc
type: ClusterIP
kubectl exec -it `kubectl get -o json pods -l app=isva-dsc | jq -r .items[0].metadata.name` isva_cli
5. You can monitor the bootstrapping of the container using the 'logs' command:
Kubernetes Environments
The following Kubernetes environments is validated by using the Security Verify Access image:
Minikube
Minikube is a tool that makes it easy to run Kubernetes locally. Minikube runs a single-node
Kubernetes cluster inside a VM on your laptop for users looking to try out Kubernetes or develop with
it day-to-day. Further information can be obtained from the Minikube Web site: https://kubernetes.io/
docs/getting-started-guides/minikube/
To set the context for the kubectl utility use the following command:
IBM Cloud
The IBM cloud container service provides advanced capabilities for building cloud-native apps,
adding DevOps to existing apps, and relieving the pain around security, scale, and infrastructure
management. Further information can be obtained from the IBM Cloud Web site: https://
www.ibm.com/cloud/container-service
To set the context for the kubectl utility use the IBM Cloud CLI to obtain the kubectl configuration
file:
bx cs cluster-config <cluster-name>
148 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
To set the context for the kubectl utility use the Google Cloud CLI:
Redhat Openshift
RedHat OpenShift is an open source container application platform based on the Kubernetes
container orchestrator for enterprise application development and deployment. For more information,
see: https://www.openshift.com/.
To set the context for the kubectl utility use the OpenShift CLI:
oc login
The oc binary is the preferred mechanism for accessing the OpenShift CLI and can be used
interchangeably with the kubectl utility.
The default security context which is enabled by RedHat OpenShift is too restrictive for the Verify
Access container. As a result of this a less restrictive security context should be enabled for the
service account which will run the Verify Access containers (in the examples provided in this chapter
we use the ‘Verify Access’ service account).
The pre-defined ‘anyuid’ security context can be used, but this does provide additional capabilities
that are not required by the Verify Access containers. To create a security context with the minimum
set of capabilities required for the Verify Access containers:
1. Ensure that the oc binary is available in the environment and that a login has already been
performed.
2. Create a configuration file that is named -scc.yaml. This configuration file defines a new security
context which can be used by the Verify Access containers:
#
# The minimum security context constraints which are required to run
# the Verify Access container. We cannot use the 'restricted' security
# constraint as we need additional capabilities which would otherwise
# be denied to the container. The 'anyuid' security constraint may
# be used, but it allows additional capabilities which are not
# required by the container.
#
kind: SecurityContextConstraints
apiVersion: v1
# The Verify Access container needs to be run as a 'custom' user, but does
# not need to run as the root user.
runAsUser:
type: MustRunAsNonRoot
seLinuxContext:
type: MustRunAs
fsGroup:
type: RunAsAny
supplementalGroups:
type: RunAsAny
# By default we drop all capabilities and then only add back in the
# capabilities which are required by the Verify Access container.
requiredDropCapabilities:
- ALL
defaultAddCapabilities:
- CHOWN
- DAC_OVERRIDE
- FOWNER
- KILL
- NET_BIND_SERVICE
- SETFCAP
- SETGID
- SETUID
oc create -f -isva-scc.yaml
Helm Charts
Helm Charts help you define, install, and upgrade even the most complex Kubernetes application.
Helm helps you manage Kubernetes applications. Charts are easy to create, version, share, and publish.
For more information on Helm, see https://helm.sh/.
IBM now provides a helm chart that can be used to deploy an IBM Security Verify Access environment.
The helm chart is available from the IBM Security charts repository in GitHub: https://github.com/IBM-
Security/helm-charts/tree/master/stable/ibm-sam.
This chart allows you to deploy a complete IBM Security Verify Access environment, including the
following containers:
• Configuration
• WebSEAL
• Runtime
• Distributed Session Cache
• PostgreSQL Database (although this should only be used in test environments - an external database
should always be used in production environments)
The following diagram shows the components of the ibm-sam Helm chart:
150 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Note:
• Multiple Web Reverse Proxy instances can be created;
• The Distributed Session Cache will support a primary/secondary instance (active-passive);
• Each of the containers will retrieve configuration information from the configuration service of the
configuration container.
Additional information can be found in the README.md file provided with the Helm chart.
version: '3'
services:
#
# Security Verify Access Containers
#
isva-config:
image: ibmcom/verify-access:${ISVA_VERSION}
hostname: isva-conf
environment:
- SERVICE=config
# - SNAPSHOT=${SNAPSHOT}
# - FIXPACKS=${FIXPACKS}
# - ADMIN_PWD=${ADMIN_PWD}
- CONTAINER_TIMEZONE=${TIMEZONE}
volumes:
- ./isva-volume:/var/shared
- ./isva-logs/conf:/var/application.logs
ports:
- ${CONFIG_HTTPS_PORT}:9443
depends_on:
- isva-ldap
- isva-db
cap_add:
- SYS_PTRACE
- SYS_RESOURCE
isva-webseal:
image: ibmcom/verify-access:${ISVA_VERSION}
hostname: isva-webseal
environment:
- SERVICE=webseal
- INSTANCE=${WEBSEAL_INSTANCE_NAME}
# - SNAPSHOT=${SNAPSHOT}
# - FIXPACKS=${FIXPACKS}
# - ADMIN_PWD=${ADMIN_PWD}
- CONTAINER_TIMEZONE=${TIMEZONE}
volumes:
- ./isva-volume:/var/shared
- ./isva-logs/webseal:/var/application.logs
ports:
- "${WEBSEAL_HTTPS_PORT}:443"
- "${WEBSEAL_HTTP_PORT}:80"
depends_on:
- isva-ldap
- isva-dsc
cap_add:
- SYS_PTRACE
- SYS_RESOURCE
isva-aac:
image: ibmcom/verify-access:${ISVA_VERSION}
hostname: isva-aac
environment:
- SERVICE=runtime
# - SNAPSHOT=${SNAPSHOT}
# - FIXPACKS=${FIXPACKS}
# - ADMIN_PWD=${ADMIN_PWD}
- CONTAINER_TIMEZONE=${TIMEZONE}
volumes:
- ./isva-volume:/var/shared
- ./isva-logs/aac:/var/application.logs
ports:
- "${AAC_HTTPS_PORT}:443"
- "${AAC_HTTP_PORT}:80"
depends_on:
- isva-ldap
- isva-db
- isva-webseal
- isva-dsc
cap_add:
- SYS_PTRACE
- SYS_RESOURCE
isva-dsc:
image: ibmcom/verify-access:${ISVA_VERSION}
hostname: isva-dsc
environment:
- SERVICE=dsc
- INSTANCE=1
# - SNAPSHOT=${SNAPSHOT}
# - FIXPACKS=${FIXPACKS}
# - ADMIN_PWD=${ADMIN_PWD}
- CONTAINER_TIMEZONE=${TIMEZONE}
volumes:
- ./isva-volume:/var/shared
- ./isva-logs/dsc:/var/application.logs
ports:
- "${DSC_SERVICE_PORT}:443"
- "${DSC_REPLICA_PORT}:444"
cap_add:
- SYS_PTRACE
- SYS_RESOURCE
#
# Service Containers
152 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
isva-ldap:
image: ibmcom/verify-access-openldap:${ISVA_VERSION}
hostname: isva-ldap
environment:
- LDAP_ADMIN_PASSWORD=${LDAP_PASSWORD}
# - LDAP_CONFIG_PASSWORD=${LDAP_CONFIG_PASSWORD}
# - LDAP_BASE_DN=${LDAP_BASE_DN}
# - LDAP_TLS_VERIFY_CLIENT=${LDAP_TLS_VERIFY_CLIENT}
# - LDAP_DOMAIN=${LDAP_DOMAIN}
# - LDAP_ORGANISATION=${LDAP_ORGANISATION}
# - LDAP_ENABLE_PORT_389=${LDAP_SSL_DISABLED}
volumes:
- libldap:/var/lib/ldap
- ldapslapd:/etc/ldap/slapd.d
- libsecauthority:/var/lib/ldap.secAuthority
ports:
# - ${LDAP_PORT}:389
- ${LDAPS_PORT}:636
isva-db:
image: ibmcom/verify-access-postgresql:${ISVA_VERSION}
hostname: isva-db
environment:
- POSTGRES_DB=${DB_NAME}
- POSTGRES_USER=${DB_USER}
- POSTGRES_PASSWORD=${DB_PASSWORD}
- POSTGRES_SSL_CN=${DB_CN}
# - POSTGRES_UNSECURE=${DB_SSL_DISABLED}
volumes:
- pgdata:/var/lib/postgresql/data
ports:
- "${DB_PORT}:5432"
Environment
The environment is defined in the following .env file.
ISVA_VERSION=10.0.0.0
TIMEZONE=Australia/Brisbane
#
# Security Verify Access CONTAINERS
#
# The name of the snapshot which is to be used when starting the container.
# The snapshot must reside in <shared-volume>/snapshots
# SNAPSHOT=
# Config Container
CONFIG_HTTPS_PORT=10443
# AAC Container
AAC_HTTP_PORT=11080
AAC_HTTPS_PORT=11443
# DSC Container
DSC_SERVICE_PORT=13443
DSC_REPLICA_PORT=13444
#
# SERVICE CONTAINERS
#
# LDAP Container
LDAP_PORT=14389
LDAPS_PORT=14636
LDAP_DOMAIN=ldap.ibm.com
LDAP_PASSWORD=passw0rd
LDAP_ORGANISATION=isva
LDAP_BASE_DN=cn=isva
LDAP_CONFIG_PASSWORD=passw0rd
LDAP_TLS_VERIFY_CLIENT=false
LDAP_SSL_DISABLED=true
# Database Container
DB_PORT=15432
DB_CN=isva
DB_SSL_DISABLED=false
DB_USER=postgres
DB_PASSWORD=passw0rd
DB_NAME=isva
Overview
This Docker Compose configuration defines an environment with the following containers:
• Security Verify Access containers (ibmcom/verify-access)
– Configuration container
– WebSEAL instance container
– AAC runtime container
– DSC container
• Services
– PostgreSQL server container (ibmcom/verify-access-postgresql)
– OpenLDAP server container (ibmcom/verify-access-openldap)
This environment has been created for simplicity to demonstrate:
• The concept of the shared configuration volume.
The shared configuration volume is created in a folder named 'isva-volume'. All Security Verify
Access containers share this volume.
• Log file storage
The log file directories are created in a folder name 'isva-logs'. Each Security Verify Access
container has its own log directory within this folder.
• Port mappings that are used by each container
All environment variables and port mappings are externalized to the file '.env' for convenience.
• How to persist data within the OpenLDAP and PostgreSQL containers.
The PostgreSQL and OpenLDAP containers will store their data in folders named 'db' and 'ldap'
respectively.
Note:
• If you are not using the Advanced Access Control capability, you do not need the isva-postgres and
isva-aac containers. However, if you are using the Federation capabilities in your environment, you
will need similar containers created.
• The name of the WebSEAL instance that is run in the isva-webseal container must be defined when
the container is created. Customize the value of WEBSEAL_INSTANCE_NAME in .env or create your
WebSEAL instance with the default name 'default'.
Quick start
Place the 'docker-compose.yaml' and '.env' files into a new directory. From that directory, execute
the following command to start the test environment:
docker-compose up -d
154 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
This command will create and start all of the containers in the environment.
To access the LMI, open your web browser and visit:
https://{docker-host}:10443
or
https://{docker-host}:CONFIG_HTTPS_PORT if .env has been customized
docker-compose down
Note that the data stored on the shared configuration volume and log file directories will not be removed
when the environment is destroyed.
Additional commands
Some example commands for some common Docker Compose tasks are listed in the following table:
Table 19. Example commands for some common Docker Compose tasks
Task Command
Run just the configuration service container and its docker-compose run isva-config
dependencies
Stop the LDAP service container docker-compose stop isva-ldap
Remove the stopped LDAP service container docker-compose rm isva-ldap
Recreate the Database service container docker-compose up --force-recreate -d
isva-db
For more information about Docker Compose, see the Docker Compose website. (https://
docs.docker.com/compose/)
all
Reload the entire configuration. This will involve some minimal service interruption while the services
are restarted.
check
Check whether the container is running with the latest snapshot.
policy
Reload the Security Verify Access policy database. No service interruption will occur as a result of this
operation. The policy option is only available in Web Reverse Proxy containers.
runtime
Reload the federation and advanced access control runtime information. No service interruption will
occur as a result of this operation. The runtime option is only available in runtime containers.
force
Use this option to force the use of the locally cached data in the event that the configuration service is
unavailable.
156 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Cluster support
The Security Verify Access appliance includes cluster support, which allows multiple appliances to share
configuration information and runtime information to work together in a clustered environment.
For information about how to configure and administer a cluster in the LMI, see “Managing cluster
configuration ” on page 72.
158 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Security Settings
In an IBM Security Verify Access appliance cluster, the nodes share configuration data and runtime data
that is related to the security settings.
Configuration data
• One-time password (OTP) mapping rules.
• Policy information such as risk profiles, attributes, and obligations.
• Configuration information such as user registry data.
• All of the advanced configuration data.
Geolocation data
• Data that maps ranges of IP addresses to geographic locations.
Runtime data
• Session data.
• Non-session data that is relevant to the cluster, such as one-time passwords.
• Template files.
System settings
In an IBM Security Verify Access appliance cluster, the nodes share some system settings.
Cluster configuration
The cluster configuration information is replicated across the nodes of the cluster.
Runtime tuning parameters
The advanced tuning parameters are replicated across the nodes of the cluster.
Runtime settings
By default, the policy server configuration and policy database is not replicated across the cluster.
However, you can choose to replicate this data. For more information about this configuration, see the
"Replicate settings across the cluster" details in “Managing cluster configuration ” on page 72.
SSL certificates
By default, the key file that is used by external clients to communicate with the DSC is not
automatically distributed to nodes in the cluster. However, you can choose to replicate this data by
selecting the 'Replicate with Cluster' check box on the SSL certificates management page.
Table 20. Possible architectures for clusters that contain multiple nodes
Number
of Combination of
masters masters Considerations
1 Primary master only. No failover for cluster services.
2 Primary master and This configuration includes a secondary master to provide failover
secondary master. for the cluster services, which include the distributed session
cache (DSC), configuration database, geolocation database, and
runtime database.
3 Primary master, You can optionally designate a tertiary master to provide extra
secondary master, and failover for the distributed session cache.
tertiary master.
Only the distributed session cache recognizes the tertiary master
node. The configuration, geolocation, and runtime databases
consider the tertiary node as a non-master node.
4 Primary master, You can optionally designate tertiary and quaternary masters to
secondary master, provide extra failover for the distributed session cache.
tertiary master, and
Only the distributed session cache recognizes the tertiary and
quaternary master.
quaternary master nodes. The configuration, geolocation, and
runtime databases consider these nodes as non-master nodes.
For high availability in a cross data center environment, you can consider separating the master
appliances between the data centers as depicted in Figure 3 on page 161.
160 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
This figure shows the data replication and service availability across the master nodes.
Distributed session cache
The primary master maintains the master copy of the distributed session cache and the other master
nodes keep slave copies for failover purposes.
Runtime database
If you are using the internal runtime database, the primary master maintains the master copy of this
data, while the secondary master keeps a slave copy for failover purposes.
If you are using an external runtime database, the cluster does not provide failover. In this case, the
external database server is responsible for ensuring high availability.
Configuration and geolocation databases
The primary master is the only master on which you can update the configuration and geolocation
databases. The other nodes in the cluster, including secondary, tertiary, and quaternary masters,
maintain a read-only copy of the information from these databases.
Failover in a cluster
The distributed session cache, internal runtime database, geolocation database, and configuration
database have varying failover capabilities in a clustered environment.
If you configure a secondary master and the primary master fails, the distributed session cache and
the internal runtime database failover to the secondary master. When the primary master is restored,
reconciliation occurs and the primary master resumes control of these services. For the distributed
session cache, a full copy of all sessions is restored.
You can also configure tertiary and quaternary masters for distributed session cache failover. If the
primary and secondary masters are both unavailable, the distributed session cache fails over to the
tertiary master. If the tertiary master is also unavailable, the distributed session cache fails over to the
quaternary master.
The distributed session cache forms a chain of session replication from the primary to the quaternary
master. If any node in the chain fails, it can request a full copy of all sessions from either partner in the
chain when it recovers. There is no disk caching of sessions, so a full copy is required.
There is no failover between the master servers for the configuration and geolocation databases. If the
primary master fails, the other nodes have a local read-only copy of the information that they can use in
the interim. However, no configuration or geolocation updates are possible until the primary master is
back online or a new primary master is designated.
Note: For WebSEAL to successfully fail over, set the following parameter in the [junction] stanza of
the WebSEAL configuration file:
162 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
You can configure the cluster to replicate the runtime settings and certificate database settings on the
Replication tab of the Cluster Configuration page. For more information about these settings, see the
"Replicate settings across the cluster" details in “Managing cluster configuration ” on page 72.
When you enable replication of the runtime settings, the policy server configuration and policy database
information is copied from the primary master to every node in the cluster. The keys that are used for
SSL communication between the Security Verify Access servers are also distributed across the cluster. If
these settings are changed, the primary master sends the updates to the other nodes in the cluster.
The following process occurs when you enable replication of the runtime settings from the local
management interface of the primary master:
• Any policy servers on other nodes in the cluster are stopped.
• The policy server configuration and policy database information is copied from the primary master to all
other nodes in the cluster. Any existing policy server configuration on these nodes is overwritten by the
configuration from the primary master.
• SSL keys for communication between the Security Verify Access servers are copied to every node.
• LDAP servers on other nodes in the cluster are stopped.
• If the Policy Server is configured to use a local LDAP, the LDAP data is copied to every node in the
cluster and LDAP is started on each node.
Note: If there are WebSEAL instances or authorization servers, which are configured against a different
policy server, you must reconfigure them to use the policy server on the primary master.
If you are using an external directory server with SSL enabled, you must configure the cluster to
replicate the certificate database settings. If you enable this replication setting, the key files for SSL
communication with the external directory server are distributed across the cluster.
If the primary master fails, you can promote any other node in the cluster to be the new primary master.
The policy server starts automatically on the new primary master. All of the Security Verify Access servers
on the other nodes are automatically reconfigured to use the policy server on the new primary master.
The Security Verify Access servers can connect to the new policy server without requiring a restart. For
more information about promoting a node to primary master, see “Promoting a node to primary master
when the original primary master is unavailable” on page 165.
When a node is promoted to primary master and replication for the runtime settings is enabled, the
following process occurs:
• The replicated policy server configuration is modified to listen on one of the Management Interfaces.
• The policy server is started on the promoted node.
• If the Policy Server is configured to use a local LDAP, the local LDAP is started on the promoted node.
• Any configured WebSEAL and authorization servers on nodes in the cluster are modified to point to the
policy server on the new primary master.
When you disable replication of the runtime settings, the policy server configuration and policy database
information is removed from the other nodes in the cluster. If you are using the local LDAP on the primary
master, the replicated copies of the LDAP files are removed from the other nodes. The WebSEAL instances
and authorization servers in the cluster continue to use the policy server on the primary master.
Note: After you disable the replication, restart the Security Verify Access server on each node in the
cluster.
If the policy server is configured with a local LDAP server as the user registry, high availability is provided.
Each node of the cluster contains a read-only replica of the LDAP server that is used automatically in
failover scenarios.
If the LDAP server provided by the primary master becomes unavailable to a node, any authorization
servers that run on that node will failover to their local replicas. During this time, only read operations
are possible. When the primary master LDAP server becomes available again, the node will automatically
revert to normal operation.
164 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
You can use the local management interface of the primary master to update the cluster configuration
and select the supplementary masters. To promote a node to secondary, tertiary, or quaternary master,
complete these steps:
1. Open the Cluster Configuration page from the primary master local management interface.
2. Go to the General tab.
3. Change the values in the master fields. That is, Secondary master, Tertiary master, Quaternary
master.
4. Save and deploy the updates.
Procedure
Use the local management interface of the appliance that you are promoting to primary master to update
the configuration. You can promote a non-master node or one of the supplementary masters if available.
To promote the selected node to primary master, complete these steps:
1. Access the local management interface of the node that you want to promote to primary master.
2. Select System > Network Settings > Cluster Configuration.
3. Select the General tab.
4. Select Set this appliance as a Primary Master.
5. Use the available menu to set the Primary master IP address. Select the first management interface of
the appliance.
6. Save and deploy the changes.
Procedure
Use the local management interface of the current primary master to update the configuration.
1. Access the local management interface of the current primary master.
2. Select System > Network Settings > Cluster Configuration.
3. Select the General tab.
4. Select a new primary master from the list of nodes in the drop-down list.
5. If applicable, update the rest of the configuration to ensure that you do not break any of the clustering
rules.
6. Save and deploy the changes.
Procedure
To remove the failed node from the cluster, complete the following steps in the local management
interface of the new primary master:
1. Go to the Overview tab on the Cluster Configuration page.
2. Under the Nodes section, select the node to remove.
3. Click Delete.
4. Select the Force check box to force the removal of the node even if the node cannot be reached.
5. Click Yes to confirm the operation.
6. Deploy the changes.
After you remove the failed node from the cluster, you might want to restart it and ultimately restore it as
a cluster member. In this case, you must complete some additional steps. While the node is disconnected
from the network, change it to a stand-alone cluster with only a single node, as described in the following
steps.
7. Restore the node and use its local management interface to access the Cluster Configuration page.
8. Go to General tab.
9. From the overview page, remove all other nodes.
10. Change the Primary master IP address to 127.0.0.1.
11. Save and deploy the change.
12. Troubleshoot the original failure and resolve any problems.
You can now join the restored appliance back in to the original cluster. This process joins the restored
node to the cluster as a non-master node:
13. In the local management interface of the restored appliance, go to the Overview tab on the Cluster
Configuration page.
166 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
Select the steps for the task you want to complete:
• Configuring a restricted node during registration
Configure a restricted node when you register the node by using the local management interface.
a. Register a node to a cluster.
For more information, see Managing cluster configuration.
b. Check Join as restricted node in the Join Cluster window.
c. Click Join to add the appliance to a cluster as a restricted node.
• Configure a restricted node in a cluster
Use the local management interface to specify a restricted node in a cluster.
a. Log on to the master appliance.
b. From the top menu of the local management interface, select System > Cluster Configuration.
c. Select the Overview tab.
d. Select the node to be set as restricted in the Nodes grid.
e. Click Restricted Node.
f. Click Submit.
Cluster maintenance
Back up procedures
In a clustered environment, you cannot use VMWare snapshots to back up your virtual machines. For
reliable backups, use appliance snapshots to back up the cluster.
You can complete an appliance snapshot on each cluster member to effectively back up the cluster. An
appliance snapshot of the primary master includes all of the cluster configuration and runtime data. When
the primary master is restored from an appliance snapshot, it updates every cluster member with the
restored configuration.
An appliance snapshot of a node other than the primary master excludes the runtime database
information. When a cluster member is restored from a snapshot, it contacts the primary master to obtain
up-to-date configuration and runtime information.
To effectively back up the cluster, complete an appliance snapshot of the primary master after any change
to the cluster configuration. For example, take a snapshot after you add or remove a node to ensure that
the correct nodes are included in the cluster after a restore.
168 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Cluster registration
Before you register or unregister a node in a cluster, consider these registration rules.
• You must activate your products on the primary master before you activate the product on any other
nodes.
If you are using the internal runtime database in a cluster, you must also activate the product on the
secondary master before the other nodes.
For more information about the activation process, see Activating the product and buying support.
• A node cannot be registered with a cluster if it is already a member of another cluster. In this situation,
the node must first be unregistered from its current cluster.
• Node registration must occur directly through the local management interface of the appliance that you
want to join the cluster. The appliance that you are registering must be able to communicate with the
primary master.
• Node unregistration must occur on the primary master.
• A node cannot be unregistered if it is configured as a master. You must first demote the node from
master and promote another node as the master.
Cluster ports
When you configure an appliance cluster, you are required to specify the starting port number for a range
of ports to be dedicated to the services that are provided by the cluster.
It is important to note that these ports are for internal use only and are not used by the cluster for
communication between nodes. All of the communication that takes place between nodes in the cluster
occurs over port 22. This means that if your nodes are separated by a firewall, you only need to open up
traffic on port 22 to allow the cluster services of the various nodes to communicate with each other.
The following diagram illustrates the communication requirements of the various roles in the cluster.
If you want to manually configure a DSC client on a node within the cluster, use the following addresses
and ports:
Note: The following examples assume that the first port is 2020.
Some additional settings are required to configure a DSC client on a node within the cluster. Set the
priority for each distributed session cache server to 9 within the server stanza entry in the [dsess-
cluster] stanza. Also set the load-balance stanza entry in the [dsess-cluster] stanza to no.
The DSC does not support load balancing. Setting the load-balance configuration entry to no prevents
connection attempts to servers for which the connection attempts will certainly fail.
Related reference
server
load-balance
170 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Deployment pattern
Read this section to understand the components of a typical cluster environment and how to set up such
environments. In this typical deployment scenario, the cluster incorporates both a Security Verify Access
base appliance and an appliance with Advanced Access Control activated.
The following diagram illustrates a sample cluster environment.
172 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Protocol Scenario
SAML20 Single Sign-On – Different Binding (Post, Artifact, Redirect)
SAML20 Single Sign-On – Different NameIdFormats Email, Persistent (HVDB and LDAP
data sources) and Transient
SAML20 NameIdManagement – Update and Terminate
SAML20 Single Logout – Different Bindings ( Post, Artifact, SOAP)
SAML20 Single Sign-On With AccessPolicy
174 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Protocol Scenario
SAML11 Single Sign-On – Different Binding (Post, Artifact)
SAML11 Invoking an STS chain from a mapping rule during an SSO flow.
WS-Federation Single Sign-On
WS-Federation Single Sign-On with one-time assertion use enforcement set to true.
Protocol Scenario
OAuth 2.0/OIDC AuthorizationCode, Implicit, and Hybrid flows with static client
OAuth 2.0/OIDC AuthorizationCode, Implicit, and Hybrid flows with dynamic client
OAuth 2.0/OIDC AuthorizationCode, Implicit, and Hybrid flows with different response types
and response modes
OAuth 2.0/OIDC AuthorizationCode, Implicit, and Hybrid flows with different token endpoint
authentication mechanisms such as Post, Basic, JWT and Client Certificate.
Limitations
Each Verify Access instance must have the following items configured identically to ensure consistent
behaviour.
• Reverse proxy authentication mechanisms
• Junctions
• Verify Access runtime configuration (including managed groups, ACLs, and POPs)
176 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Table 21. WebSEAL features that the appliance does not support
Feature Description
Custom libraries, including CDAS and EAS The appliance does not support custom CDAS
modules. As a result, the appliance does not
support the following authentication mechanisms:
• IP address
• HTTP header
• Post password change
WebSEAL does not provide CDAS modules for
these mechanisms.
Note: The appliance does support the
IBM Security Identity Manager Password
Synchronization Plug-in. For more information, see
the [itim] stanza in the Stanza Reference topics
in the Knowledge Center.
Application Response Measurement (ARM) WebSEAL software includes support for ARM to
monitor transactions throughout the request and
response processing stream. The appliance does
not include ARM support.
Tivoli Common Directory Logging The Tivoli Common Directory Logging feature
stores all log files for IBM Security software
applications in a common file system directory. The
appliance does not support this common logging.
Logging for the appliance is managed through the
LMI.
Auditing to a pipe or CARS The appliance cannot send audit records directly
to a pipe or a CARS server. It can however, use an
intermediate Verify Access authorization server to
indirectly send audit records to the destinations.
DRAFT - NOT FOR PUBLICATION
Table 21. WebSEAL features that the appliance does not support(continued)
Feature Description
ARS (web service) The IBM Security Verify Access for Web ARS web
service can send request information to an external
ARS server for authorization. ARS is not available
on the appliance.
178 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
-c config-file
The name of the WebSEAL configuration file.
d dst-dir
The name of the destination directory. This directory must not exist on the file system.
-v
Display more status messages during the execution of the script.
For example, use the following script:
-d /tmp/migrate_out
g. Review the files that are contained within the destination directory to ensure that all of the
necessary files are located.
• Manually create the directory structure and copy the files to those directories.
On the source WebSEAL server, create the directory structure of configuration files, as defined in
the following table. Only those directories for which files are to be migrated must be created. Create
these directories as subdirectories under a single source directory.
doc-root/errors The error pages that are served by the WebSEAL instance. These files
are typically located under the /opt/pdweb/www-<instance>/lib/
errors directory.
doc-root/html The management HTML pages (for example, login.html) which are
served by the WebSEAL instance. These files are typically located under
the /opt/pdweb/www-<instance>/lib/html directory.
doc-root/oauth The OAuth response files, as defined within the [oauth-eas] stanza of
the WebSEAL configuration file.
junctions The XML files that contain the junction definitions for the WebSEAL
instance. These files are typically located under the /opt/pdweb/
www-<instance>/jct directory.
etc The configuration files that are used by the WebSEAL instance. In
particular, the routing file, the webseald-<instance>.conf, and the
webseald-<instance>.conf.obf files.
Note: When you create the directory structure, additional subdirectories are not supported for any
directory other than the doc-root ones (doc-root/docs, doc-root/errors, doc-root/html,
doc-root/oauth). For example, you can create a directory structure such as /doc-root/error/
<folder>/<file>, but a structure such as xslt/http-transformation/<folder>/<file> is
not valid. For directories other than the doc-root ones, files can be placed only in the default root
180 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
directories that are listed in Table 22 on page 180. For example, xslt/http-transformation/
<file>.
Note: All files to be copied must have unique file names. If two files have the same name, the
migration tool copies only the first file that matches the name. For example, you might have the
following structure:
[http-transformation]
request_pop1 = <path1>/pop1.xsl
response_pop1 = <path2>/pop1.xsl
Only <path1>/pop1.xsl are created in the directory structure. All references to <path1>/
pop1.xsl and <path2>/pop1.xsl in the configuration file are reduced to pop1.xsl, which now
points to the same file.
4. The WebSEAL configuration file must be included in the set of configuration files to be migrated. The
obfuscated configuration file, as defined by the [configuration-database] stanza and file
configuration entry, must also be included.
5. Modify the copied WebSEAL configuration file so that any configuration entries that are not applicable
to the new WebSEAL instance are removed. Examples of entries that you might potentially not want
to migrate would include network settings. The following configuration entries are ignored when the
configuration file is imported into the appliance:
• token-card configuration entry from the [authentication-levels] stanza
• server-name configuration entry from the [server] stanza
• network-interface configuration entry from the [server] stanza
• [interfaces] configuration stanza
6. Create a compressed file, with the contents relative to the location that contains the copied files. For
example, on a UNIX system, if the directory structure was created in /tmp/migrate, the command
would be:
Procedure
1. Create a WebSEAL instance on the appliance with the local management interface.
2. Import the migration compressed file.
Note:
• If you are warned that files might be overwritten as a part of the import operation, you must validate
the overwrite operation before you can continue. Make sure that the overwrite operation does not
affect any other WebSEAL instances that might be running on the appliance. For detailed steps when
you import with the local management interface, see Import the contents of a compressed file into
the administration pages root.
• If the appliance is a non-primary node in a clustered environment, and you enabled replication
of SSL certificates in the cluster, first manually import the required SSL key files into the primary
node and wait for these certificates to be replicated to the non-primary node. After the replication
is complete, you can then import the WebSEAL configuration bundle into the non-primary node.
If you do not follow this procedure in this type of environment and instead import the WebSEAL
configuration directly on the non-primary node, the certificates from the WebSEAL configuration
compressed file might be replaced during the next replication event by the certificates from the
primary master and this will cause deployment issues.
• The import function audits the configuration file changes and logs the auditing details in the file
migrate_YYYYMMDDHHMM.log. To access this file, go to Monitor > Manage > Reverse Proxy Log
Files, select the instance from Reverse Proxy Instances, this log file is accessible under Log Files
for Selected Instance.
3. Deploy the changes.
4. Restart the WebSEAL instance.
5. Examine the WebSEAL log file for any potential migration issues.
Procedure
1. In the appliance top menu, go to System > File Downloads.
2. Under common > migrate, select the isam_migrate.pl file to download it.
This file is a Perl utility to help facilitate the collection of files that are required by the migration.
3. Copy the isam_migrate.pl file to the existing Access Manager software environment.
182 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
4. Run the isam_migrate.pl script, specifying the location of the runtime environment and policy
server configuration path.
-c <config-path>
The path of the IBM Security Access Manager configuration files.
-d <working-dir>
The name of the working directory. This directory must not exist on the file system.
-o <zip-file>
The name of the configuration bundle .zip file to produce. This file must not exist on the file system.
-v
Display more status messages during the execution of the script.
The following script is an example:
Note: In most situations, the existing user registry is used by the migrated policy server. An exception
to this situation is the environment where Active Directory is used as the user registry. In this situation,
the Security Verify Access metadata must be migrated from the existing user registry to a new user
registry. The isam_migrate.pl utility also provides this capability.
To migrate from a Windows computer that runs the Security Access Manager policy server, that uses
Active Directory as the user registry, you can use the following commands:
-U
Unconfigure the old Active Directory policy server. This parameter is used to clean up the Security
Verify Access user data from the Active Directory server after the data is migrated.
-i
The user registry that is embedded in the appliance is used by the policy server. If this parameter is
not present, then the LDAP server is external to the destination appliance.
-h <ldap-host>
The host name of the user registry against which the policy server is configured. This option is not
required if the "-i" option is used.
-p <ldap-port>
The port of the user registry against which the policy server is configured. This option is not
required if the "-i" option is used.
-s
If this parameter is present, then SSL is used by the policy server when it is communicating with
the external user registry. This option is not required if the "-i" option is used.
-D <ldap-admin-dn>
The distinguished name of the administrator of the external user registry that is used. This option is
not required if the "-i" option is used.
-a <authority-suffix>
The LDAP suffix that is used to hold the Security Verify Access secAuthority data. This option is not
required if the "-i" option is used.
-w <ldap-pwd>
The password for the administrator of the external or internal user registry.
-b
Migrate the users as Security Verify Access basic users.
-k <keyfile>
A GSKit CMS keyfile that contains the Active Directory CA certificate. If the option "-i" was not
supplied and "-s" was supplied, then it must also contain the external LDAP server SSL CA
certificate.
-W <keyfile-pwd>
The password for the specified keyfile.
-f <usergroup-ldif-file>
The file that stores all non-system user and group metadata in LDIF format. This file must be
added after the policy server is migrated.
Note: This file is not used for the migration on the appliance. Do not include this file in the <zip-
file>.
• Generate a migration .zip file that can be used to configure a policy server on the appliance with the
embedded LDAP server.
184 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
• Generate a migration .zip file that can be used to configure a policy server on the appliance with an
external LDAP server.
• Unconfigure the Active Directory server. This command is used to clean up the Security Verify Access
user data from the Active Directory server after the data is migrated.
Note: Use this unconfigure command only after you finish generating the migration .zip file.
As an example, use the following set of assumptions:
– The user is logged in to the Active Directory machine that is running the policy server and has
administrative access to Active Directory and the local machine.
– Perl is installed into the directory C:\perl.
– The isam_migrate.pl file is in C:\.
– The current working directory is C:\.
The following command is based on the list of assumptions:
C:\perl\bin\perl.exe isam_migrate.pl -U -c
"C:\Program Files\Tivoli\Policy Director\etc"
5. If a compressed file is not automatically created on your platform, create a compressed file where the
contents are relative to the location that contains the copied files.
For example, on a UNIX system, if the directory structure was created in /tmp/isam, the command
would be:
6. In the destination appliance's local management console, import the compressed file created in the
previous step.
a) Go to Web > Manage > Runtime Component.
b) Click Configure.
c) Click Import.
d) In the pop-up window, click Browse.
e) Select the compressed file that contains the necessary migration files.
f) Click Import.
g) Deploy the changes.
Note:
• If you are migrating from an environment that uses a local LDAP server, you might need to
manually change the host values (localhost) in the pd.conf and ldap.conf files to IP
addresses that suit your new environment.
• The behavior of "[ssl] ssl-v3-enable" in pd.conf changed after version 6.1.1. It now
provides the default for all other Security Verify Access servers on the same machine, unless their
.conf file explicitly sets its value. Previously this option only affected the pdadmin command. So
if "[ssl] ssl-v3-enable = yes" is set in the migrated pd.conf, and is not explicitly set in
the migrated ivmgrd.conf file, then the policy server starts with SSLv3 enabled. To obtain the
behavior before migration, add "[ssl] ssl-v3-enable = no" into the ivmgrd.conf file. It
would be better to not use SSLv3 at all and set "[ssl] ssl-v3-enable = no" in the migrated
pd.conf file.
What to do next
If you want to add the <usergroup-ldif-file> after migration, you must apply this file to the LDAP server
that is used by the new policy server by using an LDIF tool.
186 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
188 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Web service
Deploy the pending configuration changes
URL
https://{appliance_hostname}/isam/pending_changes/deploy
Method
GET
Parameters
N/A
Response
HTTP response code and JSON error response where applicable.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/deploy
Response:
200 ok
DRAFT - NOT FOR PUBLICATION
https://{appliance_hostname}/isam/pending_changes/forget
Method
GET
Parameters
N/A
Response
HTTP response code and JSON error response where applicable.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/forget
Response:
200 ok
https://{appliance_hostname}/isam/pending_changes/count
Method
GET
Parameters
N/A
Response
HTTP response code and JSON data that represents the number of pending changes.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes/count
Response:
{"count": 3}
https://{appliance_hostname}/isam/pending_changes
Method
GET
Parameters
N/A
190 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Response
HTTP response code and JSON data that represents the list of pending changes.
Example
Request:
GET https://{appliance_hostname}/isam/pending_changes
Response:
200 ok
[{
"id": 0,
"policy": "SSL Certificates",
"user": "admin",
"date": "2012-11-05T11:22:20+10:00"
}]
192 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
Information about the status and the mode of the runtime environment is displayed.
Note: If the runtime environment is configured as either local stand-alone or remote stand-alone
mode, you can stop, start, or restart it with this management page. Otherwise, the Stop, Start, and
Restart buttons are disabled.
2. Depending on your needs, choose to stop, start, or restart the runtime environment.
a) To stop the runtime environment, click Stop.
b) To start the runtime environment, click Start.
c) To restart the runtime environment, click Restart.
The records of these operations are logged to the policy server log files and user registry log files.
3. Optional: To manage the policy server and user registry log files, click the Go to Application Log Files
to view the Policy Server and User Registry log files link. You can also access these log files by
selecting Monitor > Application Log Files from the top menu.
Relevant entries can be found under isam_runtime/policy_server and isam_runtime/
user_registry.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
DRAFT - NOT FOR PUBLICATION
2. Click Configure.
You can configure your policy server to be local or remote.
• Local policy server with a remote LDAP user registry
a. Under Policy Server, select Local.
b. Under User Registry, select LDAP Remote.
c. Under Common, check the check-box Restrict Management Interfaces if the local policy server
should listen only on the local interface. If the box is not checked, the policy server will listen on
all the available management interfaces.
d. Click Next.
e. On the Policy Server tab, provide settings for the fields displayed. Fields with an asterisk are
required and must be completed.
– Management Suffix: The LDAP suffix that is used to hold the IBM Security Verify Access
secAuthority data.
Note: To create the domain at the secAuthority=Default tree, you must leave this field
blank.
– Management Domain: The IBM Security Verify Access domain name.
Note: Make sure that the domain name you specify is unique among all domains on the LDAP
server. The existence of a domain with the same name in a different suffix also causes an
error. As this field is the name of the management domain, do not specify an LDAP DN.
Here are some example settings and the corresponding result data:
Setting Result
secAuthority=Default
Management Suffix: <blank>
Management Domain: Default
194 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Setting Result
secAuthority=Default,OU=TAMDATA
Management Suffix: OU=TAMDATA
Management Domain: Default
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Click Unconfigure.
196 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Click Manage > Configuration Files.
3. Select one of the following runtime configuration files.
pd.conf
ivmgrd.conf
ldap.conf
activedir_ldap.conf
Routing File
Note: The ivmgrd.conf and Routing File options are only available when a policy server is configured
on the appliance.
4. Edit the configuration file and then click Save to save the changes. If you do not want to save the
changes, click Cancel. If you want to revert to the previous version of the configuration file, click
Revert.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 38.
Procedure
1. From the top menu, select System > System Settings > Advanced Tuning Parameters.
2. Click New.
3. In the Key field, enter runtime_profile.jvm_option.
4. In the Value field, enter the JVM debug options that suits your environment. For example, -Xdebug -
Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=1044.
5. Click Save Configuration.
6. Deploy your changes.
198 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in the local management interface.
2. From the top menu, select Web > Manage > Runtime Component.
3. Click Manage > Configuration Files.
DRAFT - NOT FOR PUBLICATION
4. Select ldap.conf.
5. Add the following lines under the [ldap] stanza.
basic-user-support = yes
Set this option to yes to support basic users.
basic-user-principal-attribute = <uid>
This attribute is the principalName of the basic and full users.
basic-user-search-suffix = <DN>
Set this option for each suffix to search for full and basic users. This must include suffixes to search
on the primary LDAP server and all federated registries.
If basic-user-support is enabled and one or more basic-user-search-suffix values are
configured, the ignore-suffix entries are disregarded. The basic-user-search-suffix
configuration entries determine the suffixes that are searched.
Note: When there are no basic-user-search-suffix entries, the system searches all
available suffixes, except for those specified by the ignore-suffix entries. If you do not specify
any basic-user-search-suffix values, you can use ignore-suffix entries to specify one or
more suffixes to exclude from the search.
If basic-user-search-suffix is not set, then all suffixes are chosen in an unspecified order.
If you choose to specify one or more basic-user-search-suffix entries, ensure that you
include an entry for every suffix that must be searched. Ensure that you include the primary suffix
for Security Verify Access accounts. For example, secAuthority=Default. If you specify one or
more basic-user-search-suffix entries, but you do not include this suffix, the search does
not return the full Security Verify Access accounts. In this case, you are not able to authenticate to
pdadmin with the sec_master account or any other Security Verify Access accounts.
basic-user-no-duplicates = {yes | no}
If set to yes, the search for basic users covers all suffixes to ensure that no users with the same
name are found. If set to no, the search for basic users stops immediately and ignores possible
duplicates.
Avoid configuring your environment to include suffixes that contain duplicates. Ensure that the
basic-user-principal-attribute is unique for all accounts across the specified suffixes. If
there are no duplicates in the environment, you can set basic-user-no-duplicates to no to
improve search efficiency. However, if duplicates exist in your environment, set basic-user-no-
duplicates to yes so that the system can return an error if it encounters more than one account
with the same principal attribute value.
basic-user-suffix-optimizer = {yes | no}
If set to yes and basic-user-no-duplicates is set to no, the search order of suffixes is sorted,
with the most hit of the basic user suffix at the head of the search suffix list. If set to no, the search
order is provided by the basic-user-search-suffix order.
Note: If basic-user-no-duplicates is set to yes, the basic-user-suffix-optimizer
entry is disregarded. In this case, all suffixes are searched to check for duplicates.
basic-user-principal-attribute = <uid>
7. Click Save.
Note: For the changes to take effect, they must be deployed as described in Configuration changes
commit process.
200 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
SSL support
The embedded LDAP server provides an SSL interface for management of the data contained in the user
registry.
The embedded LDAP server listens on port 636 of the management interface of the appliance by default.
The administrator can choose a port other than the default by modifying the advanced tuning parameter
wga.rte.embedded.ldap.ssl.port. The advanced tuning parameters are accessed through System
> Advanced Tuning Parameters. After you modify this advanced tuning parameter, you must restart the
Security Verify Access runtime environment for the change to take effect.
The SSL certificates that are used by the LDAP server can be managed through the SSL Certificates
panels of the LMI. For further details, see “Managing SSL certificates” on page 114. The certificates are
contained in the embedded_ldap_keys database file.
Two certificates are used by the LDAP server:
1. The certificate with the server label is used as the server certificate by the LDAP server. By default, the
server certificate is a self-signed certificate. But this should be replaced in a production environment.
2. The certificate with the ca label is used as the CA certificate by the LDAP server. If no ca certificate is
found in the key database, the server then uses the server certificate as the CA certificate. That is, it
expects the server certificate to be a self-signed certificate.
In addition to this, the LDAP server can support mutual authentication by client certificates, providing
that:
1. The client certificate has been signed by the CA that is known to the LDAP server. That is, the CA
certificate is stored in the keyfile with a label of ca.
2. The distinguished name (DN) contained in the client certificate precisely matches a known LDAP user.
The FIPS setting of the appliance controls the ciphers that are supported by the OpenLDAP server.
Managing passwords
Administration of the data contained in the embedded LDAP server can be performed as the
cn=root,secAuthority=Default user.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select Manage > Embedded LDAP > Password.
3. Enter the new password in the Password field.
4. Enter the new password again in the Confirm Password field.
5. Click OK to change the password.
Managing suffixes
A suffix (also known as a naming context) is a DN that identifies the top entry in a locally held directory
hierarchy. Because of the relative naming scheme used in LDAP, this DN is also the suffix of every other
entry in that directory hierarchy. The embedded LDAP server can have multiple suffixes, each identifying a
locally held directory hierarchy, for example, o=ibm,c=us.
o=My Company
o=My Company,c=US
ou=Widget Division,o=My Company,c=US
Where ou is the name for the organizationalUnit object class, o is the organization name for the
organization object class, and c is a standard two letter country abbreviation used to name the
country object class.
The following table lists the supported suffix elements and the corresponding object classes that are used
when creating the top level entry for the suffix:
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select Manage > Embedded LDAP > Suffixes.
All current suffixes are listed. You can then add or delete suffixes as needed.
3. Follow the prompts to complete the action you want to take.
Procedure
1. Select Web > Manage > Runtime Component.
2. On the Runtime Component page, select Manage > Embedded LDAP > Change Debug Level.
202 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
3. Select or clear the check boxes to indicate the wanted debug level. You can select zero to multiple
debug level options.
Tip: Use the check box at the top to select or clear all debug level options.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
204 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. You can select single or multiple instances.
Stop an instance
a. Select the instance(s) of interest.
b. Click Stop.
c. A message is displayed indicating that the instance has been stopped successfully.
Start an instance
a. Select the instance(s) of interest.
b. Click Start.
c. A message is displayed indicating that the instance has been started successfully.
Restart an instance
a. Select the instance(s) of interest.
b. Click Restart.
c. A message is displayed indicating that the instance has been restarted successfully.
3. To operate on all instances do not select any instances:
Stop all instances
Ensure that no instances are selected.
a. Click Stop All.
b. A message is displayed indicating that the instances are stopped successfully.
Start all instances
Ensure that no instances are selected.
a. Click Start All.
b. A message is displayed indicating that the instances are started successfully.
Restart all instances
Ensure that no instances are selected.
a. Click Restart All.
b. A message is displayed indicating that the instances are restarted successfully.
DRAFT - NOT FOR PUBLICATION
Configuring an instance
To configure an instance with the local management interface, use the Reverse Proxy management page.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Click New.
3. Provide settings for the fields that are displayed on the Instance, IBM Security Verify Access,
Transport, and User Registry tabs.
• On the Instance tab:
Field Description
Instance Name This is the new instance name, which is a unique name that identifies the
instance. Multiple instances can be installed on the same computer system.
Each instance must have a unique name.
Host Name The host name that is used by the IBM Security Verify Access policy server to
contact the appliance. The address that corresponds to this host name must
match a management interface address of the appliance. The addresses that
are associated with the application interface of the appliance cannot be used
for communication with the IBM Security Verify Access policy server.
Valid values include any valid host name or IP address. For example:
libra.dallas.ibm.com
Listening Port This is the listening port through which the instance communicates with the
Security Verify Access policy server.
IP Address for The IP address for the logical interface.
the Primary
Interface
• On the IBM Security Verify Access tab:
Field Description
Administrator The Security Verify Access administrator name.
Name
Administrator The Security Verify Access administrator password.
Password
Domain The Security Verify Access domain.
• On the Transport tab:
Field Description
Enable HTTP Specifies whether to accept user requests across the HTTP protocol.
HTTP Port The port to listen for HTTP requests. This field is only valid if the Enable HTTP
check box is selected.
Enable HTTPS Specifies whether to accept user requests across the HTTPS protocol.
206 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Field Description
HTTPS Port The port to listen for HTTPS requests. This field is only valid if the Enable
HTTPS check box is selected.
• On the User Registry tab:
Field Description
Enable SSL Specifies whether to enable SSL communication between the instance and the
LDAP server.
Key File Name The file that contains the LDAP SSL certificate. This field is only valid if the
Enable SSL check box is selected.
Certificate Label The LDAP client certificate label. This field is only valid if the Enable SSL check
box is selected.
Port The port number through which to communicate with the LDAP server. This field
is only valid if the Enable SSL check box is selected.
4. Click Finish.
A message is displayed indicating that the instance has been configured successfully.
Unconfiguring an instance
To unconfigure an instance with the local management interface, use the Reverse Proxy management
page.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance to unconfigure.
3. Click Delete.
4. Enter the administrator name and password.
5. Click Delete
Note: Select the Force check box if unconfiguration fails multiple times. Use this option only as a last
resort.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Edit.
4. Make your changes to the settings on the Server, SSL, Junction, Authentication, SSO, Session,
Response, Logging, and Interfaces tabs.
Server
The Server tab contains entries that are related to the general server configuration.
Field Description
HTTPS Select this check box to enable the HTTPS port within Reverse Proxy.
HTTPS Port The port over which Reverse Proxy listens for HTTPS requests.
Field Description
HTTP Select this check box to enable the HTTP port within Reverse Proxy.
HTTP Port The port over which Reverse Proxy listens for HTTP requests.
Interface Address The network interface on which the Reverse Proxy server listens for
requests.
Enable HTTP/2 Select this check box to enable HTTP/2 incoming connections on the
primary interface from clients (browsers).
Persistent The maximum number of seconds that a persistent connection with a client
Connection can remain inactive before it is closed by the server.
Timeout
Worker Threads The number of threads that are allocated to service requests.
Cluster is Master If the Reverse Proxy clustering function is used, this check box controls
whether this Reverse Proxy server acts as the cluster master.
Master Instance The server name for the Reverse Proxy instance which is acting as the
Name master within the cluster. This option is only enabled if the Cluster is Master
check box is not selected.
Message Locale The locale in which the Reverse Proxy runs.
SSL
The SSL tab contains entries that are related to the general SSL configuration of the server.
Field Description
SSL Certificate Key File The key database that is used to store the certificates
which are presented by Reverse Proxy to the client.
Network HSM Key File The key database that stores the certificates to be used by
the network Hardware Security Module (HSM) device.
SSL Server Certificate The name of the SSL certificate, within the key database,
which is presented to the client. The drop-down list
includes certificates from both the local and network key
files. The certificates from the network key file are prefixed
with the token label for the network HSM device.
JCT Certificate Key File The key database that is used to store the certificates
which are presented by Reverse Proxy to the junctioned
Web servers.
Junction
The Junction tab contains entries that are related to the general junction configuration.
Field Description
HTTP Timeout Timeout in seconds for sending to and reading from a TCP
junction.
HTTPS Timeout Timeout in seconds for sending to and reading from an SSL
junction.
Ping Interval The interval in seconds between requests which are sent by
Reverse Proxy to junctioned Web servers to determine the
state of the junctioned Web server.
208 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Field Description
Ping Method The HTTP method that Reverse Proxy uses when it sends
health check requests to the junctioned Web server.
Ping URI The URI that Reverse Proxy uses when it sends health check
requests to the junctioned Web server.
Maximum Cached Persistent The maximum number of connections between Reverse
Connections Proxy and a junctioned Web server that will be cached for
future use.
Persistent Connection Timeout The maximum length of time, in seconds, that a cached
connection with a junctioned Web server can remain idle
before it is closed by Reverse Proxy.
Managed Cookie List A pattern-matched and comma-separated list of cookie
names for those cookies which are stored in the Reverse
Proxy cookie jar. Other cookies are passed by Reverse Proxy
back to the client.
Authentication
The Authentication tab contains entries that are related to the configuration of the authentication
mechanisms which are used by the server.
Basic Authentication
Field Description
Transport The transport over which basic authentication is supported.
Realm Name Realm name for basic authentication.
Forms Authentication
Field Description
Forms Authentication The transport over which forms authentication is supported.
Field Description
Accept Client Certificates Defines the condition under which client certificates are
required by Reverse Proxy.
Certificate EAI URI The resource identifier of the application that is invoked to
perform external client certificate authentication.
Certificate Data The client certificate data that are passed to the EAI
application.
Kerberos Authentication
Field Description
Transport The transport over which Kerberos authentication is
supported.
Keytab File Name of the Kerberos keytab file. The keytab file must
contain each of the service principal names used for
SPNEGO authentication.
Field Description
Use Domain Qualified Name Kerberos authentication provides a principal name in the
form of "shortname@domain.com". By default, only the
shortname is used as the Security Verify Access user ID. If
this checkbox is selected, then the domain is also included
as part of the Security Verify Access user ID.
Kerberos Service Names The list of Kerberos service principal names used for the
server.
The first service name in the list is the default service
name. To make a service name the default, select the
service name and then click Default.
EAI Authentication
Field Description
Transport The transport over which EAI authentication is
supported.
Trigger URL A URL pattern that is used by Reverse Proxy to determine
whether a response is examined for EAI authentication
headers.
Authentication Levels The designated authentication level for each of the
configuration authentication mechanisms.
Token Authentication
Field Description
Transport The transport over which RSA authentication is
supported.
You can also click Go to RSA Configuration to access the RSA Configuration page.
OIDC Authentication
Field Description
Transport Specifies the transport for which
authentication using the OIDC authentication
mechanism is enabled.
Redirect URI The redirect URI which has been registered
with the OIDC OP. The redirect URI should
correspond to the /pkmsoidc resource of
the WebSEAL server (for example: https://
isva.ibm.com/pkmsoidc). If no redirect
URI is configured it will be automatically
constructed from the host header of the
request.
Discovery Endpoint The discovery end-point for the OP. The
CA certificate for the discovery-endpoint
and corresponding authorization and token
endpoints must be added to the WebSEAL
key database.
210 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Field Description
Proxy URL The URL of the proxy which will be used when
communicating with the OP.
Client Id The Security Verify Access client identity, as
registered with the OP.
Client Secret The Security Verify Access client secret, as
registered with the OP.
Response Type The required response type for authentication
responses. The possible values are:
code
The authorization code flow will be used
to retrieve both an access token and
identity token.
id_token
The implicit flow will be used to retrieve
the identity token.
id_token token
The implicit flow will be used to retrieve
both an access token and identity token.
Field Description
Id Token Attributes The list of claims from the ID token which
should be included in the credential as an
extended attribute. The claim name can
contain pattern matching characters: '*','?'.
The claims will be evaluated against each
rule in sequence until a match is found. The
corresponding code (+/-) will then be used to
determine whether the claim will be added
to the credential or not. If the claim does not
match a configured rule it will by default be
added to the credential.
Click the Load Key button to load the SSL key for the discovery URI into the WebSEAL key file.
This will be achieved by retrieving the root certificate from the server. If the CA certificate is
not provided by the server it should be loaded manually into the WebSEAL SSL key file. This
operation is not supported when a proxy is configured. In this environment the key should be
loaded manually into the SSL key file.
Click the Test Endpoint button to see whether the endpoint can be successfully accessed by
WebSEAL and that it returns the expected OIDC meta-data.
Session
The Session tab contains entries that are related to the general session configuration.
Field Description
Re-authentication for Inactive Whether to prompt users to re-authenticate if their entry
in the server credential cache has timed out because of
inactivity.
Max Cache Entries The maximum number of concurrent entries in the session
cache.
Lifetime Timeout Maximum lifetime in seconds for an entry in the session
cache.
Inactivity Timeout The maximum time, in seconds, that a session can remain
idle before it is removed from the session cache.
TCP Session Cookie Name The name of the cookie to be used to hold the HTTP
session identifier.
SSL Session Cookie Name The name of the cookie to be used to hold HTTPS session
identifier.
Use Same Session Select the check box to use the same session for both
HTTP and HTTPS requests.
Session Cache
Field Description
Enable Distributed Sessions Select the check box to enable distributed
sessions on this reverse proxy instance.
212 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Field Description
Session cache type Select the type of session cache to be used,
either Redis session cache or Distributed
session cache.
Note: The appliance must be a part of an
appliance cluster to enable the distributed
session cache. Also, if the cluster configuration
changes and a new master is specified, this
option must be disabled and then re-enabled.
The instance can then pick up the details of the
new cluster configuration.
Response
The Response tab contains entries that are related to response generation.
Field Description
Enable HTML Redirect Select the check box to enable the HTML redirect function.
Enable Local Response Redirect Select the check box to enable the local response redirect
function.
Local Response Redirect URI When local response redirect is enabled, this field contains
the URI to which the client is redirected for Reverse Proxy
responses.
Local Response Redirect Macros The macro information which is included in the local
response redirect.
SSO
The SSO tab contains entries that are related to the configuration of the different single-sign-on
mechanisms that are used by the server.
Failover
Field Description
Transport The transport over which failover authentication is supported.
Cookies Lifetime Maximum lifetime in seconds for failover cookies.
Cookies Key File The key file which is used to encrypt the failover cookie.
LTPA
Field Description
Transport The transport over which LTPA authentication is supported.
Cookie Name The name of the cookie which is used to transport the LTPA
token.
Key File The key file that is used when accessing LTPA cookies.
Field Description
Key File Password The password that is used to access the LTPA key file.
CDSSO
Field Description
Transport The transport over which CDSSO authentication is supported.
Transport (generation) The transport over which the creation of CDSSO tokens is
supported.
Peers The name of the other Reverse Proxy servers that are
participating in the CDSSO domain. Along with the name of the
keyfile that are used by the Reverse Proxy servers.
ECSSO
Field Description
Transport The transport over which e-community SSO
authentication is supported.
Name Name of the e-community.
Is Master Authentication Server Select the check box if this Reverse Proxy
server is the master for the e-community.
Master Authentication Server The name of the Reverse Proxy server that
acts as the master of the e-community. This
field is not required if this Reverse Proxy
server is designated as the master.
Domain Keys The name of the other Reverse Proxy servers
which are participating in the e-community.
Along with the name of the keyfile that is
used by the various Reverse Proxy servers.
Logging
The Logging tab contains entries that are related to the logging and auditing configuration.
Field Description
Enable Agent Logging Select the check box to enable the agent log.
Enable Referer Logging Select the check box to enable the referrer log.
Enable Request Logging Select the check box to enable the request log.
Request Log Format The format of the entries that are contained within the request log.
Maximum Log Size The maximum size of the log file before it is rolled over.
Flush Time The period, in seconds, that Reverse Proxy caches the log entries
before the system writes the entries to the log file.
Enable Audit Log Select the check box to enable the generation of audit events.
Audit Log Type Select the events to be audited.
Audit Log Size The maximum size of the audit log file before it is rolled over.
214 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Field Description
Audit Log Flush The period, in seconds, that Reverse Proxy caches the audit log
entries before the system writes the entries to the log file.
Interfaces
The Interfaces tab contains settings that are related to WebSEAL secondary interfaces.
• To add a new secondary interface, click New. Then, define your settings in the pop-up window
that contains the following fields:
Field Description
Application Interface IP Address The IP address on which the WebSEAL
instance listens for requests.
HTTP Port This field contains the port on which the
WebSEAL instance listens for HTTP requests.
HTTPS Port This field contains the port on which the
WebSEAL instance listens for HTTPS requests.
Web HTTP Port This is the port that the client perceives
WebSEAL to be using.
Web HTTP Protocol This is the protocol that the client perceives
WebSEAL to be using.
Certificate Label The label of the SSL server certificate that
is presented to the client by the WebSEAL
instance.
Accept Client Certificates Defines the condition under which client
certificates are required by WebSEAL.
Worker Threads The number of threads that is allocated to
service requests.
HTTP/2 Enables HTTP/2 connection.
HTTP/2 Maximum Connections The maximum number of HTTP/2 connections
allowed per specified port.
HTTP/2 Header Table Size The size of HTTP/2 header table.
HTTP/2 Maximum Concurrent Streams The maximum concurrent HTTP/2 streams
allowed.
HTTP/2 Initial Window Size The initial window size of HTTP/2 connections.
HTTP/2 Maximum Frame Size The maximum frame size of HTTP/2
connections.
HTTP/2 Maximum Header List Size The maximum header list size of HTTP/2
connections.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Manage > Configuration > Edit Configuration File.
4. Edit the configuration file that is displayed and then click Save to save the changes. If you do not want
to save the changes, click Cancel. If you want to revert to the previous version of the configuration file,
click Revert.
Tip: When you are editing the configuration file, you can use the search function of the browser to
locate a string. For example, press Ctrl+F.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 38.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Manage > Configuration > Export Configuration.
4. Confirm the save operation when your browser displays a confirmation window.
Related tasks
“Migrating an existing WebSEAL instance to the appliance” on page 179
You can migrate an existing WebSEAL instance to the appliance.
“Migrating an existing Access Manager software environment to the appliance” on page 182
You can migrate an existing Access Manager software environment to the appliance with the provided
mechanism.
216 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
The resource filtering is based on the items that are listed in the Registered Resources table on
the Operating Configuration tab within the Web Content Protection Configuration pane. It is a list
of URIs, which can include wild cards. If there is a match to any of these, the request then goes to the
detection engine.
The issues that the detection engine will check for depends on what items are enabled on the Issues tab.
You can enable or disable these individually, or click Trust X-Force to automatically disable all issues for
which there is not a default response. Events that are detected go to the action module.
Lastly, the response/action module specifies what happens when there has been a detection. This is
configured in the Resource Actions section back on the Issues tab. If you do not specify an action in this
part, then the specified default action (or 'default response') for this issue will be performed.
The Web Application Firewall logging data is stored in the pam.log file. To access this log file:
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the reverse proxy instance.
3. Click Manage > Logging. The Manage Reverse Proxy Log Files window will be displayed.
4. The log file pam.log contains the Web Application Firewall logging data.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the Reverse Proxy instance to configure web application firewall for.
3. Click Manage > Configuration > Web Content Protection.
4. On the Operating Configuration tab, you can configure general Web Content Protection settings.
a) Select the Enable Web Content Protection check box to turn on the web application firewall.
b) To run the firewall in a simulation mode without actually affecting the client traffic, select the
Enable Simulation Mode check box. When the simulation mode is enabled, any detected issues
are audited and then ignored. You can preview the issues that are detected and adjust the settings
if necessary before any real actions are taken against the offending requests.
c) Select the Use Proxy HTTP Header check box as needed.
This is used to control whether the audit log contains the IP address of the client as obtained from
the network connection, or the IP address that is obtained from the x-forwarded-for HTTP header.
This setting is useful when a network terminating firewall sits between the reverse proxy and the
client.
d) Provide a value in bytes for the Maximum Memory Size field. This defines the maximum memory
that can be used by the PAM engine.
Note: PAM has a pre-defined minimum memory size. If the configured value is set to less than the
minimum, the allocated memory is automatically increased to this minimum size.
e) Under Resource Actions:
Note: Use this table to customize the actions that are taken when issues are encountered for a
particular resource. This is a pattern-matched list that is searched in order. The resource name can
contain the "*" and "?" pattern-matching characters. If no matching resource is found, the default
actions, as recommended by the x-force team, are taken.
• To add a resource:
1) Click New.
2) On the Add Custom Resource page, provide the resource name. All issues available to the
resource are pre-populated.
Note: Resource names can contain the "*" and "?" pattern-matching characters. For example,
*.html.
3) Select an issue that you want to modify and then click Edit.
4) On the Edit Custom Resource Issue page, select the action to take against this issue in the
Response field.
5) Optional: If Quarantine is selected as the event response in the previous step, specify the
quarantine time in the Quarantine Period field.
6) Click Save on the Edit Custom Resource Issue page.
7) Click Save on the Add Custom Resource page.
• To edit a resource:
1) Select the resource name to edit.
2) Click Edit.
3) On the Edit Custom Resource page, select the issue that you want to modify and then click
Edit.
4) On the Edit Custom Resource Issue page, modify the event response and quarantine time as
needed.
5) Click Save on the Edit Custom Resource Issue page.
6) Click Save on the Edit Custom Resource page.
• To delete a resource:
1) Select the resource name to delete.
2) Click Delete.
Note: There is no confirmation window for this delete operation. Make sure that the selected
resource is the one you want to delete before you click Delete.
f) Under Registered Resources:
Note: The registered resources are used to designate the requests that are passed to the
inspection engine. When a request is received by the Web reverse proxy, the entries in the list is
sequentially searched until a match is found. The action that is assigned to the matching resource
controls whether the inspection is enabled or disabled. The resources can contain wildcard
characters for pattern matching.
• To add a registered resource:
1) Click New.
2) On the Add Protected Resources page that pops up, provide the Resource Name. For
example, index.html, *.html or *.gif.
3) Select Enabled or Disabled as needed.
4) Click Save.
• To edit a registered resource:
1) Select the resource to edit from the list.
2) Click Edit.
3) On the Edit Protected Resources page that pops up, modify the resource name and whether it
is enabled as needed.
218 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
4) Click Save.
• To delete a registered resource
1) Select the resource to delete from the list.
2) Click Delete.
Note: There is no confirmation window for this delete operation. Make sure that the selected
resource is the one you want to delete before you click Delete.
g) Under Injection Tuning Parameters, modify the listed parameters by double-clicking a value in
the Units column and editing inline as needed. To see a description of each parameter, hover your
mouse cursor on that parameter and a pop-up message that contains the description is displayed.
5. On the Issues tab, you can enable or disable certain issues.
Note: The list of issues control the events that are monitored by the inspection engine. If an issue is
disabled, the inspection engine no longer checks for this issue.
• Approach 1:
a. Select the event to edit.
b. Click Edit.
c. On the Edit Issue page, select Enabled or Disabled as needed.
d. Click Save.
• Approach 2:
– Select or clear the Enabled check box to enable or disable a particular issue.
• Approach 3:
– Click Trust X-Force to automatically disable all issues for which there is not a default response.
6. On the Audit tab, you can configure logging and auditing settings.
a) Under Log detailed audit events, select the check box if you want to enable logging for detailed
audit events.
b) Under Log Audit Events, select one of the options to indicate where the audit events are sent.
c) Under Log Audit Config, define the following parameters based on the selections made in the
previous step.
• If Log to File is selected:
Parameter Description
File Name The entry specifies the name of the log file.
Rollover Size The maximum size to which a log file can grow before it is rolled over. The
default value is 2000000 bytes.
Buffer Size The maximum size of the message that is used when smaller events are
combined.
Queue Size There is a delay between events being placed on the queue and the file log
agent removing them. This parameter specifies the maximum size to which the
queue is allowed to grow.
High Water Processing of the event queue is scheduled regularly at the configured flush
Mark interval. It also is triggered asynchronously by the queue size reaching a high
water mark on the event queue. The default value is two-thirds of the maximum
configured queue size. If the maximum queue size is zero, the high water mark
is set to a default of 100. If the event queue high water mark is set to 1, every
event queued is relayed to the log agent as soon as possible.
Parameter Description
Flush Interval This entry controls the frequency with which the server asynchronously forces a
flush of the file stream to disk. The value defined for this parameter is 0, < 0, or
the flush interval in seconds.
• If Log to Remote Authorization Server is selected:
Parameter Description
Compress To reduce network traffic, use this parameter to compress buffers before
transmission and expand on reception. The default value is no.
Buffer Size To reduce network traffic, events are buffered into blocks of the nominated
size before they are relayed to the remote server. This parameter specifies
the maximum message size that the local program attempts to construct by
combining smaller events into a large buffer. The default value is 1024 bytes.
Flush Interval This parameter limits the time that a process waits to fill a consolidation buffer.
The default value is 20 seconds. A flush interval of 0 is not allowed. Specifying a
value of 0 results in the buffer being flushed every 600 seconds.
Queue Size There is a delay between events being placed on the queue and the file log
agent removing them. This parameter specifies the maximum size to which the
queue is allowed to grow.
High Water Processing of the event queue is scheduled regularly at the configured flush
Mark interval. It also is triggered asynchronously by the queue size reaching a high
water mark on the event queue. The default value is two-thirds of the maximum
configured queue size. If the maximum queue size is zero, the high water mark
is set to a default of 100. If the event queue high water mark is set to 1, every
event queued is relayed to the log agent as soon as possible.
Error Retry If a send operation to a remote service fails, the system tries again. Before the
Timeout system tries again, it waits for the error retry timeout in seconds. The default
value is 2 seconds.
Logging Port Configure the port parameter to specify the port that the remote authorization
server listens on for remote logging requests. The default value is port 7136.
Rebind Retry If the remote authorization server is unavailable, the log agent attempts to
rebind to this server at this frequency in number of seconds. The default rebind
retry timeout value is 300 seconds.
Hostname The remote logging services are offered by the authorization service. The server
parameter nominates the hosts to which the authorization server process is
bound for event recording.
DN To establish mutual authentication of the remote server, a distinguished name
(DN) must be configured. A distinguished name must be specified as a string
that is enclosed by double quotation marks.
• If Log to Remote Syslog Server is selected:
Parameter Description
Remote Syslog The host to which the syslog server process is bound for event recording.
Server
Port The port on which the remote syslog server listens for remote logging
requests.
Application ID The name of the application, as it appears in the messages that are sent
to the remote syslog server.
220 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Parameter Description
Error Retry Timeout If a send operation to a remote service fails, the system tries again.
Before the system tries again, it waits for the error retry timeout in
seconds. The default value is 2 seconds.
Flush Interval This parameter limits the time that a process waits to fill a consolidation
buffer. The default value is 20 seconds. A flush interval of 0 is not
allowed. Specifying a value of 0 results in the buffer being flushed every
600 seconds.
High Water Mark Processing of the event queue is scheduled regularly at the configured
flush interval. It also is triggered asynchronously by the queue size
reaching a high water mark on the event queue. The default value is two-
thirds of the maximum configured queue size. If the maximum queue size
is zero, the high water mark is set to a default of 100. If the event queue
high water mark is set to 1, every event queued is relayed to the log agent
as soon as possible.
Queue Size There is a delay between events being placed on the queue and the file
log agent removing them. This parameter specifies the maximum size to
which the queue is allowed to grow.
Rebind Retry If the remote system log server is unavailable, the log agent attempts to
rebind to this server at this frequency in number of seconds. The default
rebind retry timeout value is 300 seconds.
7. On the Advanced Configuration tab, you can configure coalescer, inspection engine, issues, and custom
actions.
a) Under Coalescer Configuration:
Note: The coalescer is used to correlate audit events. The administrator can use these
configuration settings to fine-tune the processing of the coalescer and thus reduce the number of
messages that are sent to the audit log.
• To add a coalescer parameter:
1) Click New.
2) On the Add Coalescer Parameter page that pops up, provide the parameter name and value.
3) Click Save.
• To edit a coalescer parameter:
1) Select the parameter to edit from the list.
2) Click Edit.
3) On the Edit Coalescer Parameter page that pops up, modify the parameter name and value as
needed.
4) Click Save.
• To delete a coalescer parameter:
1) Select the parameter to delete from the list.
2) Click Delete.
Note: There is no confirmation window for this delete operation. Make sure that the selected
parameter is the one you want to delete before you click Delete.
b) Under Inspection Engine Configuration:
• To add a inspection engine configuration parameter:
1) Click New.
2) On the Add Inspection Parameter page that pops up, provide the parameter name and value.
3) Click Save.
• To edit a inspection engine configuration parameter:
1) Select the parameter to edit from the list.
2) Click Edit.
3) On the Edit Inspection Parameter page that pops up, modify the parameter name and value as
needed.
4) Click Save.
• To delete a inspection engine configuration parameter:
1) Select the parameter to delete from the list.
2) Click Delete.
Note: There is no confirmation window for this delete operation. Make sure that the selected
resource is the one you want to delete before you click Delete.
8. Click Save.
222 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Manage > Management Root.
All current management files and directories are displayed. The default directories include:
management
The Web Reverse proxy management pages. For example, login.html
errors
The error pages that can be returned by the Web Reverse proxy.
oauth
The HTML files that can be returned by the oauth module.
junction-root
The static HTML files that are served by the local junction of the Web Reverse proxy.
Note: A fixed location is used as the document root. A local junction cannot run any CGI scripts. It
can serve only static page content.
224 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance to update the management certificate for.
3. Select Manage > Renew Management Certificate.
4. Enter your administrator name and password.
5. Click Renew.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance to configure Mobile Multi-Factor Authentication for.
3. Select Manage > MMFA Configuration.
4. On the Main tab, select the type of traffic you want to apply MMFA to.
5. On the AAC LMI tab, provide the following details and then click Next.
Host name
The host name or IP address of the LMI server. This field is automatically populated with values
from the current browser window.
Port
The port number of the LMI server. This field is automatically populated with values from the
current browser window.
Username
The user name that is used to authenticate with the LMI server. The default value is admin.
Password
The password that is used to authenticate with the LMI server.
6. On the AAC Runtime tab, provide the following details and then click Next.
Host name
The host name or IP address of the runtime server. The default value is localhost.
Port
The port number of the runtime server. The default value is 443.
Username
The user name that is used to authenticate with the runtime server. The default value is easuser.
Password
The password that is used to authenticate with the runtime server.
7. On the Reuse Options tab, provide the following details and then click Next.
Reuse certificates
Select to reuse the SSL certificate if it was already saved. If this check box is not selected, the
certificate is overwritten.
Reuse ACLs
Select to reuse any existing ACLs with the same name. If this check box is not selected, the ACLs
are replaced.
8. Click Finish.
226 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. You can view the current state and version information of all instances.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Troubleshooting > Statistics.
4. Select the statistics component that you want to modify.
5. Click Edit.
6. Select the check box beside Enabled if it is not already checked.
7. Modify the Interval, Count, Flush Interval, Rollover Size, Maximum Rollover Files, and Compress
fields as needed.
By default, the Compress option is set to No. To save disk space, set the Compress option to Yes so
that all rollover files are automatically compressed.
8. Click Save to save your changes.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Troubleshooting > Statistics.
4. Select the statistics component of interest.
DRAFT - NOT FOR PUBLICATION
5. Click Files.
The file name, file size, and last modified time information of all statistics log files is displayed.
• View a statistics log file or a snippet of a statistics log file
a. Select the statistics log file that you want to view and then click View. The contents of the
statistics log file are displayed.
b. You can enter a value into the Number of lines to view field and then click Reload to get a
customized snippet view of the log file. Optionally, you can provide a value in the Starting from
line field to define the start of the lines. If the Starting from line field is set, then the Number
of lines to view field determines how many lines to view forward from the starting line. If the
Starting from line field is not set, then the Number of lines to view field determines how many
lines to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
• Export a statistics log file
a. Select the statistics log file that you want to export.
b. Click Manage > Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
c. Confirm the save operation in the browser window displayed.
• Delete a statistics log file
a. Select the statistics log file or files that you want to delete and then click Delete.
Note: Only log files that are not in use can be deleted. To disable a log file, you can select the
log file, click Edit, clear the Enabled check box, and then click Save.
b. Click Yes to confirm the operation.
• Delete all unused statistics log files
a. Click Manage > Delete All.
b. Click Yes to confirm the operation.
Archiving and deleting reverse proxy log files with the command-
line interface
Use the logs option in the command-line interface to archive Web Reverse Proxy log files to a USB device
and then delete old log files to free up disk space.
Procedure
1. In the command-line interface, go to isam > logs.
2. Optional: Enter help to display all available commands.
228 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Monitor > Reverse Proxy Graphs > Reverse Proxy Traffic.
2. On the Reverse Proxy Traffic page, specify the settings for the chart displayed.
Instance
The instance which the data displayed are specific to.
Aspect Type
The type of chart to display the data with. Select one from Column and Lines, Column, and Lines.
Start Date
The starting date.
Start Time
The starting time of the day.
Date Range
The duration over which data is collected and displayed. Select from 1 Hour to 30 Days.
For example, if the date and time that is chosen is 04.12.2012 10.00 and the duration is 12 Hours,
the data that are collected between 10:00 a.m. and 10:00 p.m. on 12th April 2012 are displayed.
By default, data of the first instance in the instance list for the last 24 hours are displayed, grouped by
junction.
Procedure
1. To view the Reverse Proxy Throughput:
• From the dashboard, locate the Reverse Proxy Throughput widget.
• From the top menu, select Monitor > Reverse Proxy Graphs > Reverse Proxy Throughput.
2. Specify the settings for the chart displayed.
• On the dashboard, select the duration over which data is collected and displayed with the Data
Range list.
• On the Reverse Proxy Throughput page, use the following settings:
Chart Type
The type of chart to display the data with. Select one from Column and Lines, Column, and
Lines.
Date Range
The duration over which data is collected and displayed. Select from 1 Hour to 30 Days.
Start Date
The starting date.
Start Time
The starting time of the day.
For example, if the date and time that is chosen is 04.12.2012 10.00 and the duration is 12
Hours, the data that are collected between 10:00 a.m. and 10:00 p.m. on 12 April 2012 are
displayed.
By default, data of all configured WebSEAL instances on this appliance from the last 24 hours are
displayed.
Procedure
1. From the dashboard, locate the Reverse Proxy Health widget.
The health status of each instance, its junctions, and the junctioned servers are displayed in a
hierarchical structure. Health status is determined by the health of all elements lower than the current
element in the hierarchy.
• An instance is unhealthy if it is stopped or pdadmin cannot contact it.
• A junction is unhealthy if it is disabled or pdadmin cannot return information for it.
• A junctioned server is unhealthy if it is disabled or offline.
Each element can be in one of the three health states:
Warning The element contains at least one unhealthy child element and at
least one healthy child element.
230 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the dashboard, locate the Load Balancer Health widget.
• Under High Availability (if high availability is configured):
– The first row displays the health status of the self front-end load balancer and whether it is active
or passive.
– The second row displays the health status of the peer front-end load balancer and whether it is
active or passive.
• Under Services (if at least one service is configured):
– The health status of the configured services and the load balanced servers are displayed in a
hierarchical structure. You can expand a service to view the health status of the servers that are
attached to this service.
Each element can be in one of the following health states:
Warning The element contains at least one unhealthy child element and at
least one healthy child element.
Procedure
1. From the dashboard, locate the Average Response Time widget.
The average response time for requests is displayed on a graph.
Note: The widget is only displayed if one or more Reverse Proxy instances have the Flow Data function
enabled.
2. Under Reverse Proxy Instances, select the instance to view the average response time statistics for.
3. Under Junctions, select the junctions to display on the graph. Each junction is represented by a
separate line on the graph.
4. Under Date Range, select the duration over which the response times are recorded.
Procedure
1. From the dashboard, locate the Security Actions widget. The number of times each defensive action
has been taken is displayed in a graph.
Note: The widget is only displayed if one or more instances have the security statistics function
enabled.
2. Under Reverse Proxy Instances, select the instances to view action statistics for.
Note: Only instances that have security statistics function enabled are listed for selection.
3. Under Actions, select the actions to be included in the statistics. The number of actions that are
displayed is the total of all selected actions.
4. Under Date Range, select the duration over which the actions are taken.
232 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the reverse proxy to manage junctions for.
3. Select Manage > Junction Management.
4. Click New > Virtual Junction.
5. On the Junction tab page:
a) Enter the junction label in the Junction Label field.
b) Select the Stateful Junction check box if you want the junction to be stateful.
c) Select the HTTP/2 Junction check box if you want to enable HTTP/2 protocol to the junction
server.
d) Select the HTTP/2 Proxy check box if you want to enable HTTP/2 protocol to the proxy server.
e) Specify the Server Name Indicator (SNI).
f) Select a junction type from the listed options on the right.
Notes for HTTP/2 junctions:
• The protected Web Server must serve HTTP/2 over both TCP and SSL for WebSEAL mutual
junction type with HTTP/2 to work. For example, Microsoft IIS only serves HTTP/2 over SSL. So
an HTTP/2 mutual junction type cannot be created to an IIS Web Server.
• TCP HTTP/2 junction connections do not use HTTP/2 upgrade. They require the "Prior
Knowledge" method to connect to an HTTP/2 Web Server over TCP. In Apache configuration
terms, this is the "Direct mode".
6. On the Servers tab page:
a) Click New to add a target back-end server.At lease one target back-end server must be added to
create a junction.
b) Complete the fields displayed.
c) Click Save.
7. On the Basic Authentication tab page:
a) Select the Enable Basic Authentication check box if BA header information is to be used for
authentication with the back-end server.
b) Enter the WebSEAL user name in the Username field.
c) Enter the WebSEAL password in the Password field.
d) Select the Enable mutual authentication to junctioned WebSEAL servers check box if mutual
authentication is to be used between a frontend WebSEAL server and a back-end WebSEAL server.
e) Select the key file from the list to use for mutual authentication.
f) Select the key label from the list to use for mutual authentication.
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the reverse proxy to manage junctions for.
3. Select Manage > Junction Management.
4. Click New > Standard Junction.
234 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the reverse proxy to manage junctions for.
3. Select Manage > Junction Management.
236 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
238 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the local management interface, select Web > Manage > Reverse Proxy.
A list of reverse proxy instances displays.
2. Select the reverse proxy instance name from the list.
3. Select Manage > Federation Management.
A list of federations configured for this reverse proxy instance displays.
4. Click Add.
A window opens where you can add the configuration information.
5. Enter the configuration details for the federation.
The Runtime tab provides authentication information for the federation runtime:
Host name
The host name or IP address of the runtime server. This field is required.
Port
The SSL port number of the runtime server. This field is required.
User name
The user name that is used to authenticate with the runtime server. This field is required.
Password
The password that is used to authenticate with the runtime server. This field is required.
The Federation tab specifies the federation name:
Federation Name
The name that identifies the federation that you are configuring on this reverse proxy instance.
Select the correct name from the list. If the federation name is not in the list, ensure that you set
up the runtime configuration properly for that federation.
The ACLs and Certificates tab indicates reuse of existing access control lists (ACLs) and certificates:
Reuse ACLs
Select to reuse any existing ACLs with the same name. If this check box is not selected, the ACLs
are replaced.
Reuse Certificates
Select to reuse the SSL certificate if it was already saved. If this check box is not selected, the
certificate is overwritten.
6. Click Submit.
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the local management interface, select Web > Manage > Reverse Proxy.
A list of reverse proxy instances displays.
2. Select the reverse proxy instance name from the list.
3. Select Manage > Federation Management.
A list of federations configured for this reverse proxy instance displays.
4. Select the federation name from the list.
5. Click Remove.
A pop-up window is displayed for confirmation.
6. Click Yes.
240 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Click Manage > Cleanup Servers.
3. In the pop-up window, enter you IBM Security Verify Access administrator user name and password.
These are the same user name and password you would use with the pdadmin utility.
4. Click Login.
5. From the list of authorization servers, select the one to be removed.
Note: A red icon indicates that the server is uncontactable. Stopping a server also renders it
uncontactable. Make sure that you select only the instance that is no longer relevant in your current
environment and thus should be removed.
6. Click Delete.
Note: The Delete button is only clickable when an uncontactable server with a red icon is selected.
After you delete an instance, all knowledge of this instance is removed from the policy server including
LDAP.
7. In the confirmation window, click Yes to confirm the operation.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
The status of all authorization server instances is displayed.
2. Click New.
3. In the New Authorization Server Instance window, provide values for the displayed fields.
• On the Instance tab, define the following fields.
Field Description
Instance Name Name of the authorization server instance.
Host Name Name of the local host. The name is used during the construction
of the authorization server instance name. The default value is the
host name of the local system.
Authorization Port The port over which authorization requests are received. The
default value is the next available port from 7136.
DRAFT - NOT FOR PUBLICATION
Field Description
Administration Port The port over which Security Verify Access administration
requests are received. The default value is the next available port
after the authorization port value.
IP Addresses The IP addresses on which the authorization server listens for
requests. To add an IP address to the selected box, select the
address from the list immediately under IP Addresses and then
click Add. To remove an IP address from the selected list, select
the address from the box and then click Remove.
• On the IBM Security Verify Access tab, define the following fields.
Field Description
Administrator Name The administrator user name of IBM Security Verify Access.
Administrator Password The administrator user password of IBM Security Verify Access.
Domain The domain name of IBM Security Verify Access.
• If you use an LDAP server that is external to the appliance, a User Registry tab is also displayed. On
the User Registry tab, define the following fields.
Field Description
Enable SSL Specifies whether to enable SSL communication between the
instance and the LDAP server.
Key File Name The file that contains the LDAP SSL certificate. This field is only valid
if the Enable SSL check box is selected.
Certificate Label The LDAP client certificate label. This field is only valid if the Enable
SSL check box is selected.
Port The port number through which to communicate with the LDAP
server. This field is only valid if the Enable SSL check box is
selected.
4. Click Finish.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
The status of all authorization server instances is displayed.
2. Select the instance to delete.
3. Click Delete.
4. In the Delete Authorization Server Instance window, enter the administrator name and password.
5. Optional: If you want to unconfigure the instance even if the policy server is unreachable, select the
Force check box.
6. Click Delete to confirm the operation.
242 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance of interest.
Stop an instance
a. Click Stop.
b. A message is displayed indicating that the instance is stopped successfully.
Start an instance
a. Click Start.
b. A message is displayed indicating that the instance is started successfully.
Restart an instance
a. Click Restart.
b. A message is displayed indicating that the instance is restarted successfully.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance of interest.
3. Select Manage > Configuration > Edit Configuration File.
The configuration file contents are displayed.
4. In the Advanced Configuration File Editor window, modify the configuration file.
5. Click Save to save the changes. If you want to revert to the last successfully saved version of this file,
click Revert. Or click Cancel if you do not want to save the changes.
Note: For the changes to take effect, the changes must be deployed and the running instance must be
restarted.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance of interest.
3. Select Manage > Configuration > Edit Tracing Configuration File.
The tracing configuration file contents are displayed.
4. In the Tracing Configuration File Editor window, modify the file.
5. Click Save to save the changes. Or click Cancel if you do not want to save the changes.
Note: For the changes to take effect, the changes must be deployed and the running instance must be
restarted.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance to update the management certificate for.
3. Select Manage > Renew Management Certificate.
4. Enter your administrator name and password.
5. Click Renew.
244 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select the Replicate with Cluster check box.
Note: This option is selectable on the primary master of the cluster only.
3. In the confirmation window, click Yes to confirm the operation.
The current IBM Security Verify Access runtime settings of the primary master and any future updates
are automatically replicated to the non-primary nodes.
Note: After you enable this replication option, you can no longer update the IBM Security Verify
Access runtime settings on the non-primary nodes of the cluster.
Procedure
1. From the top menu, select the menu for your activation level.
• Web > Manage > Distributed Session Cache
• AAC > Global Settings > Distributed Session Cache
• Federation > Global Settings > Distributed Session Cache
All replica set names and the number of sessions in each replica set are displayed.
DRAFT - NOT FOR PUBLICATION
2. You can then view the replica set server list and manage sessions in a particular replica set.
a) To view a list of the servers that are registered with a replica set, select the replica set and then
click Servers.
b) To manage the sessions in a replica set, select the replica set and then click Sessions.
Tip: Typically, the list of sessions contains many entries. You can locate a session or a user faster
by using the filter in the upper left corner.
Delete a specific session
1) Select the session to delete.
2) Click Delete.
3) In the confirmation window, click Delete Session.
Delete all sessions for a user
1) Select any session for that user.
2) Click Delete.
3) In the confirmation window, click Delete User.
246 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
248 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click URL Mapping.
DRAFT - NOT FOR PUBLICATION
250 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click Junction Mapping.
252 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click Client Certificate Mapping.
4. Perform any of the following actions:
Viewing details of a client certificate CDAS file:
a. Select the file to view.
b. Click Edit. The file content is displayed.
Creating a client certificate CDAS file:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
d. Click Save.
Importing a client certificate CDAS file:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting a client certificate CDAS file:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
Modifying a client certificate CDAS file:
a. Select the file that you want to modify.
b. Click Edit.
c. Modify the content of the file.
d. Click Save.
Renaming a client certificate CDAS file:
a. Select the file that you want to rename.
b. Click Manage > Rename.
c. In the New Resource Name field, enter the new name for the file.
d. Click Save.
Deleting a client certificate CDAS file:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 38.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click User Name Mapping.
4. Perform any of the following actions:
Viewing details of a user mapping CDAS file:
a. Select the file to view.
b. Click Edit. The file content is displayed.
Creating a user mapping CDAS file:
a. Click New.
b. Enter the name for the file.
c. Click Save.
Importing a user mapping CDAS file:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting a user mapping CDAS file:
a. Select the file that you want to export.
b. Click Manage > Export.
c. Confirm that you want to save the file to your local workstation.
Modifying a user mapping CDAS file:
a. Select the file that you want to modify.
b. Click Edit.
c. Modify the content of the file.
d. Click Save.
Renaming a user mapping CDAS file:
a. Select the file that you want to rename.
b. Click Manage > Rename.
c. In the New Resource Name field, enter the new name for the file.
d. Click Save.
Deleting a user mapping CDAS file:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
254 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
5. Deploy the changes as described in “Configuration changes commit process” on page 38.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click Password Strength.
Procedure
1. Log in to the local management interface.
256 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
2. Click Web.
3. Under Global Settings, click Forms Based Single Sign-On.
4. Perform any of the following actions:
Viewing details of a forms based single sign-on file:
a. Select the file to view.
b. Click Edit. The file content is displayed.
Creating a forms based single sign-on file:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
d. Click Save.
Importing a forms based single sign-on file:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting a forms based single sign-on file:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
Modifying a forms based single sign-on file:
a. Select the file that you want to modify.
b. Click Edit.
c. Modify the content of the file.
d. Click Save.
Renaming a forms based single sign-on file:
a. Select the file that you want to rename.
b. Click Manage > Rename.
c. In the New Resource Name field, enter the new name for the file.
d. Click Save.
Deleting a forms based single sign-on file:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 38.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click HTTP Transformation.
4. Perform any of the following actions:
Creating an HTTP transformation rule file:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
d. Click Save.
Importing an HTTP transformation rule file:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting an HTTP transformation rule file:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
Modifying an HTTP transformation rule file:
a. Select the file that you want to modify.
b. Click Edit.
c. Modify the content of the file.
d. Click Save.
Renaming an HTTP transformation rule file:
a. Select the file that you want to rename.
b. Click Manage > Rename.
c. In the New Resource Name field, enter the new name for the file.
d. Click Save.
Deleting an HTTP transformation rule file:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 38.
258 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click RSA SecurID Configuration.
4. Perform any of the following actions:
Uploading a new RSA server configuration file
a. Click Upload.
b. Select the file to be uploaded.
Note: The RSA configuration file to be uploaded to the appliance must be generated by the RSA
server.
c. Click Submit.
Removing an RSA server configuration file:
a. Click Clear under the Server Configuration File section.
b. Confirm that you want to clear the configuration.
Testing a configuration
a. After uploading a server configuration file, click Test.
b. Enter a valid user.
c. Enter a valid passcode.
Note: You might need to disable two-step authentication on the RSA server to successfully test
the configuration, as the test function does not support two-step authentication.
Clearing a node secret
a. Click Clear under the Node Secret File section.
b. Confirm that you want to clear the secret.
5. Deploy the changes as described in “Configuration changes commit process” on page 38.
Procedure
1. Log in to the local management interface.
2. Click Web > Global Settings > Redis Configuration
260 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
On the Server tab, when adding a new server or editing an existing server:
262 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click SSO Keys.
4. Perform any of the following actions:
Creating an SSO key:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
d. Click Save.
Importing an SSO key:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting an SSO key:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
Deleting an SSO key:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 38.
Procedure
1. Log in to the local management interface.
2. Click Web.
3. Under Global Settings, click LTPA Keys.
4. Perform any of the following actions:
Creating an LTPA key:
a. Click New.
b. Modify the content of the file.
c. Enter the name for the file.
d. Click Save.
Importing an LTPA key:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting an LTPA key:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
Deleting an LTPA key:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in “Configuration changes commit process” on page 38.
Kerberos configuration
You can create, edit, delete, and test the following Kerberos settings from the local management
interface.
264 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
Managing realms
Use the Realms tab on the Kerberos Configuration management page in the LMI to manage these settings.
These settings describe realm-specific information.
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
266 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
2. On the Domains tab, take actions as needed.
• Create a domain realm property
a. Click New.
b. In the Create New Translation window, enter the local DNS address in the Local DNS Value
field.
c. Select a realm from the Realm list.
d. Click Save.
• Edit a domain realm property
a. Select the domain realm property to edit from the table.
b. Click Edit.
c. In the Edit Property window, modify the realm as needed.
d. Click Save.
• Delete a domain realm property
a. Select the domain realm property to delete from the table.
b. Click Delete.
c. In the Confirm Action window, click Yes.
• Test authentication with principal and password
a. Click Test.
b. In the Test Kerberos Authentication window, enter the name of the user that is created as the
web server principal in the Username field.
c. Enter the password in the Password field.
d. Click Test.
Managing CA paths
Use the CA Paths tab on the Kerberos Configuration management page in the LMI to manage these
settings. These settings contain the authentication paths that are used with direct (non-hierarchical)
cross-realm authentication.
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
268 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Global Settings > Kerberos Configuration.
The current Kerberos configuration is displayed.
270 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy if you want to manage tracing for a reverse
proxy instance. Or select Web > Manage > Authorization Server if you want to manage tracing for an
authorization server instance.
2. Select the instance of interest.
3. For reverse proxy, select Troubleshooting > Tracing. For authorization server, select Manage >
Tracing.
4. Select the component to be modified and then click Edit.
5. Modify the trace level, flush interval, rollover size, maximum rollover files, and whether rollover files
are automatically compressed.
By default, the Compress option is set to No. To save disk space, set the Compress option to Yes so
that all rollover files are automatically compressed.
6. Click Save.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy if you want to manage tracing for a reverse
proxy instance. Or select Web > Manage > Authorization Server if you want to manage tracing for an
authorization server instance.
2. Select the instance of interest.
3. For reverse proxy, select Troubleshooting > Tracing. For authorization, select Manage > Tracing.
4. Select a component and then click Files to view a list of all its trace and rollover files.
The file name, file size, and last modified time of each file is displayed.
View or export a trace file or rollover file
a. Select the file of interest.
b. Click View. The content of the trace files is then displayed. To view a particular number of lines
of trace, provide a value in the Number of lines to view field and then click Reload. Optionally,
DRAFT - NOT FOR PUBLICATION
you can provide a value in the Starting from line field to define the start of the lines. If the
Starting from line field is set, then the Number of lines to view field determines how many
lines to view forward from the starting line. If the Starting from line field is not set, then the
Number of lines to view field determines how many lines to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
c. Click Export if you want to export the file.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
d. Confirm the save operation when the browser prompts you to save the file.
Delete a trace file or rollover file
a. Select the file or files of interest.
Note: Only a file that is not in use can be deleted.
b. Click Delete.
c. Click Yes to confirm the operation.
Export a trace file or rollover file
a. Select the file of interest.
b. Click Manage > Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
c. Confirm the save operation when the browser prompts you to save the file.
Delete all trace files and rollover files that are not in use
a. Click Manage > Delete All.
b. Click Yes to confirm the operation.
Procedure
1. From the top menu, select Web > Manage > Runtime Component.
2. Select Manage > Configuration Files > Tracing Configuration Files.
The tracing configuration file contents are displayed.
Note: The Tracing Configuration File menu item is available only when a local policy server is
configured. When a remote policy server is configured, this menu item is disabled. In that case, you
must directly edit the file on the machine where the policy server is installed.
3. In the Tracing Configuration File Editor window, modify the file.
4. Click Save to save the changes. Or click Cancel if you do not want to save the changes.
Note: For the changes to take effect, the changes must be deployed and the runtime environment
must be restarted.
272 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
3. Select Manage > Configuration > Edit Tracing Configuration File.
The tracing configuration file contents are displayed.
4. Modify the file.
5. Click Save to save the changes. Or click Close if you do not want to save the changes.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 38.
274 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Optional: If instance-specific log files are of interest, select the instance.
3. Select Troubleshooting > Logging.
If an instance is selected, details of all common log files and instance-specific log files are displayed. If
no instance is selected, only details of the common log files are displayed.
You can use the filter bar under Name to filter entries that meet specific conditions. Click Clear filter
to return to the full list.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Optional: If instance-specific log files are of interest, select the instance.
3. Select Troubleshooting > Logging.
4. Select the log file that you want to view.
5. Click View.
The content of the log file is displayed. By default, the last 100 lines of a log file is displayed if the
file is longer than 100 lines. You can define the number of lines to display by entering the number in
the Number of lines to view field and then click Reload. Optionally, you can provide a value in the
Starting from line field to define the start of the lines. If the Starting from line field is set, then the
Number of lines to view field determines how many lines to view forward from the starting line. If the
Starting from line field is not set, then the Number of lines to view field determines how many lines
to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Optional: If instance-specific log files are of interest, select the instance.
3. Select Troubleshooting > Logging.
4. Select the log file or files that you want to clear.
5. Click Clear.
6. On the Confirm Action confirmation page, click Yes.
Procedure
1. From the top menu, select Web > Manage > Reverse Proxy.
2. Select the instance of interest.
276 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the top menu, select Monitor > Logs > Manage Reverse Proxy Log Files.
Details of all common log files are displayed under Log Files for Selected Instance.
You can use the filter bar under Name to filter entries that meet specific conditions. Click Clear filter
to return to the full list.
2. Optional: If instance-specific log files are of interest, select the instance from the list under Reverse
Proxy Instances.
Details of all common log files and instance-specific log files are displayed under Log Files for
Selected Instance.
3. Work with the reverse proxy log files.
• View the content of a reverse proxy log file
a. Select the log file that you want to view.
b. Click View. The content of the log file is displayed. By default, the last 100 lines of a log file are
displayed if the file is longer than 100 lines. You can define the number of lines to display by
entering the number in the Number of lines to view field and then click Reload. Optionally, you
can provide a value in the Starting from line field to define the start of the lines. If the Starting
from line field is set, then the Number of lines to view field determines how many lines to view
forward from the starting line. If the Starting from line field is not set, then the Number of lines
to view field determines how many lines to view from the end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
c. Optional: Click Export to download the log file.
Note: You must configure the software to block pop-up windows in your browser to allow pop-up
windows for the appliance before files can be exported.
• Export a reverse proxy log file
a. Select the log file that you want to export.
b. Click Manage > Export.
Note: You must configure the software to block pop-up windows in your browser to allow pop-up
windows for the appliance before files can be exported.
c. Confirm the save operation in the browser window to export the file to a local location.
• Clear a reverse proxy log file
a. Select the log file or files that you want to clear.
b. Click Clear.
c. On the Confirm Action confirmation page, click Yes.
Procedure
1. From the top menu, select Web > Manage > Authorization Server.
2. Select the instance of interest.
3. Select Manage > Logging.
4. Work with the authorization server log files as needed.
View the content of an authorization server log file
a. Select the log file that you want to view.
b. Click View. The content of the log file is displayed. By default, the last 100 lines of a log file are
displayed if the file is longer than 100 lines. You can define the number of lines to display by
entering the number in the Number of lines to view field and then click Reload. Optionally,
you can provide a value in the Starting from line field to define which line in the log file to
start viewing from. If the Starting from line field is set, then the Number of lines to view field
determines how many lines to view forward from the starting line. If the Starting from line field
278 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
is not set, then the Number of lines to view field determines how many lines to view from the
end of the log file.
Note: The maximum size that can be returned is 214800000 lines. If a size greater than that is
specified, then the maximum (214800000 lines) is returned.
c. Optional: Click Export to download the log file.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
Clear an authorization server log file
a. Select the log file that you want to clear.
b. Click Clear.
c. On the Confirm Action confirmation page, click Yes. A system notification is displayed to
indicate that the log file is successfully cleared. The original log file with empty content remains
in the log list. Any rollover log files (for example, xxx.log.1 and xxx.log.2) are deleted.
Export an authorization server log file
a. Select the log file that you want to export.
b. Click Manage > Export.
Note: You must configure the software that blocks pop-up windows in your browser to allow
pop-up windows for the appliance before files can be exported.
c. Confirm the save operation in the browser window to export the file to a local location.
280 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Note: You can have only two front-end load balancers in your environment.
It is possible to configure the reverse proxy functionality on an appliance that is also acting as a front-end
load balancer. However, this configuration might have a negative impact on the performance of the front-
DRAFT - NOT FOR PUBLICATION
end load balancer. If you decide to use such setting, you must take the resources that are used by the
reverse proxy into consideration.
You must make sure that the front-end load balancer still has enough resources to perform routing
effectively.
You can configure a highly available web reverse proxy environment with as few as two appliances, as
shown in Figure 7 on page 282. The active load balancer is on the primary appliance. This load balancer
assumes the virtual IP address for the load balancing service. Client requests are received from the
Internet-facing network, 10.254.140.0. The load balancer distributes these requests between the web
reverse proxy servers, which are on the 10.254.140.0 network.
Scheduling
The front-end load balancing function of the appliance supports several types of scheduling.
In your environment, you might have some servers that are more powerful than others. You can configure
the front-end load balancer to respect the relative performance of each server by setting a weight value
for each server. You can assign weights between 1 and 256, with 256 indicating the most powerful server.
For more information about how to configure the weight of each server and select the scheduling
algorithm, see “Configuring front-end load balancer” on page 285.
The following scheduling types are supported:
282 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
lc
Least connection. The server with the lowest number of connections receives the request. This
algorithm is dynamic so you can update the weight ratios in real time.
rr
Round robin. Requests are rotated between the servers. This algorithm is dynamic and uses the
weight parameter that is assigned to each server.
srr
Static round robin. Each server is used in turn according to the defined weight for the server. This
algorithm is static so you cannot dynamically change the weight ratio for a server.
sh
Source hashing. A hash of the source IP is divided by the total weight of the running servers to
determine which server receives the request. This algorithm inherently sends requests from the same
IP address to the same server provided that the available servers remains unchanged.
Persistence
Session persistence, also known as stickiness, is a mechanism that ensures a client is connected to the
same reverse proxy server during a session.
Layer 4 load balancers can extract the client IP address from the TCP header to maintain persistence.
Layer 7 load balancers can use an HTTP cookie to provide stickiness. Subsequent requests from a
particular client are routed through the same processing path and use the same WebSEAL session.
Network termination
The front-end load balancer that is provided in Security Verify Access is a network terminating load
balancer.
Clients send requests directly to the virtual IP address of the front-end load balancer. The front-end load
balancer processes each request.
The load balancer terminates the network connection of the request from the client. It then creates a new
network connection to forward the load-balanced request to the appropriate backend server.
The Web Reverse Proxy server receives the request from the front-end load balancer and processes it.
The Web Reverse Proxy server sends its response back to the front-end load balancer. The load balancer
acts as a proxy and sends the information back to the original client.
The point of SSL termination depends on the load balancing layer. In a layer 4 configuration, WebSEAL is
responsible for the SSL termination. In a layer 7 configuration, SSL is terminated by the load balancer.
284 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
rspadd
Adds a header to the end of the HTTP response.
rspdel
Headers that match a specified regular expression are deleted from the response.
rsprep
(Case-sensitive) Search the HTTP response line for a specified regular expression and replace any
instances with a specified string.
rspirep
(Case-insensitive) Search the HTTP response line for a specified regular expression and replace any
instances with a specified string.
The available attributes to assist with HTTP header based balancing are as follows:
balance
hdr(<name>) Overrides the standard scheduler to enable balancing on the specified HTTP request
header.
There are also generic attributes to configure connection properties for the front-end load balancer. For
example, you can set values for the connection timeout, number of retries, and number of concurrent
connections. For a complete list of the available attributes, see “Configuring front-end load balancer” on
page 285.
Procedure
1. From the top menu, select System > Network Settings > Front End Load Balancer.
2. On the General tab page:
a) Select Enabled if you want to enable this front-end load balancer.
b) Select Debug if you want more debug messages to be sent to the security log.
c) Select Enable SSL if you plan to enable SSL communication for any Layer-7 services.
d) In the SSL Key File list, select the key file that contains the certificates to be used in the Layer-7
SSL communication.
Note: The SSL Key File list can only be selected if Enable SSL is enabled.
3. Optional: On the Advanced Tuning tab page, modify global level parameters to fine tune the
configuration.
a) Click Add.
b) In the Add New Parameter window, select the desired parameter from the Name list.
c) Enter a value for the selected parameter in the Value field.
d) Click Save.
4. On the Servers tab page, you can work with virtual servers and real servers. Each virtual server
corresponds to an interface (virtual IP address and port) that is load balanced. Each real server
corresponds to a load balanced server.
• Add a virtual server
a. Click New.
b. On the Add Virtual Server page, define settings of the virtual server to be added.
On the General tab page:
Field Description
Enabled Specifies whether the new virtual server is active.
Name Name of the virtual server, which is used to uniquely identify this server.
Note: The syntax for the virtual server name must be treated as if it
were a server host name. It must not contain any space characters.
Virtual Address Specifies the IP address that connects this virtual server to the public
network.
Port Specifies the port on which this virtual server listens.
Mask Specifies the network mask to be applied to the IP address for the
virtual server.
Interface Specifies the appliance interface on which the new virtual server
connects to the public network.
Layer 4 or Layer 7 The load balancing layer for the server. Layer 4 indicates TCP level load
balancing. Layer 7 indicates application level load balancing.
Cookie used in Layer The name of the cookie to be used in Layer 7 load balancing.
7
Note: This field is available only when Layer 7 load balancing has been
selected.
286 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Field Description
Layer 7 SSL The label of the certificate to be used when terminating the connection.
Certificate Label
Note: This field is available only when Layer 7 load balancing has been
selected.
Field Description
Scheduler Specifies the scheduling algorithm for distributing jobs to the real
servers. Available choices are:
lc
Least connection. The server with the lowest number of connections
receives the request. This algorithm is dynamic so you can update
the weight ratios in real time.
rr
Round robin. Requests are rotated between the servers. This
algorithm is dynamic and uses the weight parameter that is assigned
to each server.
srr
Static round robin. Each server is used in turn according to the
defined weight for the server. This algorithm is static so you cannot
dynamically change the weight ratio for a server.
sh
Source hashing. A hash of the source IP is divided by the total
weight of the running servers to determine which server receives
the request. This algorithm inherently sends requests from the same
IP address to the same server provided that the available servers
remains unchanged.
For Layer 4 operations, only a scheduler setting of sh (source hash)
specifies to use all CPUs available on the appliance. If other scheduler
settings are used for Layer 4 operation, then the load balancer process
operates that particular virtual server by using one CPU. This behavior
might impact performance of the front end load balancer for the virtual
server, particularly if the back-end servers are using SSL.
For Layer 7 operations, all CPUs available are always used regardless of
the scheduler setting.
Health Check Number of seconds between health check messages that are sent to the
Interval real servers.
Rise The number of successful health checks before a server is considered
active.
Fall The number of unsuccessful health checks before a server is considered
inactive.
Optional: On the Advanced Tuning tab page, add, edit, or delete any service level advanced
configuration parameters as needed. See “Front-end load balancer advanced tuning
parameters” on page 289 for the available parameters. See “Benefits of layer 7 load
balancing” on page 284 for descriptions of the advanced tuning attributes available.
c. Click Save.
• Delete a virtual server
a. Select the virtual server to delete from the list.
b. Click Delete.
c. On the confirmation page, click Yes.
• Edit a virtual server
a. Select the virtual server to edit from the list.
b. Click Edit.
c. On the Edit Virtual Server page, modify the settings as needed.
d. Click Save.
• Manage real servers
a. From the list of virtual servers, select the virtual server to associate the real servers with.
b. Click Real Servers. The Real Servers page is displayed.
– To add a real server:
1) Click New.
2) On the Add Real Server page that pops up, define settings for the server o be added.
Field Description
Enabled Specifies whether the new real server is active.
Address Specifies the IP address for the real server.
Weight Specifies an integer that represents this processing capacity
of the server relative to that of other real servers. For example,
a server assigned 2000 has twice the capacity of a sever
assigned 1000. The weighted scheduling algorithms adjust
this number dynamically based on workload.
SSL Enabled Specifies whether to use an SSL connection between the load
balancer and the back-end server.
SSL Certificate Label Specifies the SSL certificate label.
3) Click Save.
– To delete a real server:
1) Select the real server to delete from the list.
2) Click Delete.
3) On the confirmation page, click Yes.
– To edit a real server:
1) Select the real server to edit from the list.
2) Click Edit.
3) On the Edit Real Server page, modify the settings as needed.
4) Click Save.
c. Click Close to return to the Front End Load Balancer main page.
288 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
5. On the High Availability tab page, you can define the settings that enable high availability of the
front-end load balancer function. For example, configure a second front-end load balancer as either a
primary or a back-up load balancer for the environment.
a) Select the Enable High Availability check box to enable this feature.
b) Select Primary or Backup to designate this system as the primary or backup front-end load
balancer.
c) For the Local Interface - Primary field, select the local IP address of the front-end load balancer.
d) For the Remote Address - Backup field, specify the IP address that is used by this system to
communicate with the other front-end load balancer. This field is required if a backup load balancer
is in use.
e) For the Remote Port field, specify the port to be used for high availability communication.
f) In the Health Check Interval field, specify in seconds the interval of the heartbeat messages that
are sent between the primary and backup front-end load balancers.
g) In the Health Check Timeout field, specify in seconds the time to wait before the system declares
a non-responsive router unavailable and initiating failover.
6. On the Logging tab page, configure the local or remote logging options.
• If you select Log to local, no additional configuration is required on this page.
• If you select Log to remote, you must provide values for Syslog facility, Remote syslog server
address, and Remote syslog server port.
7. On the Error Pages tab page, customize the error pages (200, 400, 403, 408, 500, 502, 503, and 504)
that are returned by the software. These error pages are returned when the layer-7 load balancing
function encounters a problem.
• To edit an existing error page:
a. Select the error page to customize.
b. Click Edit.
c. In the Edit File window, modify the error page as needed.
d. Click Save.
• To import a new page to replace an existing error page:
a. Select the error page to be replaced.
b. Click Import.
c. In the Import Error Page window, click Browse.
d. Select the new page.
e. Click Save.
• To export an error page:
a. Select the error page to export.
b. Click Export.
c. Specify the destination location to export the file to.
d. Click Export to confirm the operation.
8. Click Save to save all changes that are made on the Front End Load Balancer management page.
Note: For the changes to take effect, they must be deployed as described in “Configuration changes
commit process” on page 38.
• log-send-hostname
• log-tag
• node
• maxconn
The following parameters are supported for each virtual server.
• fullconn
• http-check_disable-on-404
• http-send-name-header
• maxconn
• option_abortonclose
• option_accept-invalid-http-request
• option_accept-invalid-http-response
• option_clitcpka
• option_dontlog-normal
• option_dontlog-null
• option_forceclose
• option_forwardfor
• option_http-server-close
• option_httpclose
• option_log-health-checks
• option_nolinger
• option_srvtcpka
• rate-limit_sessions
• reqadd
• reqdel
• reqrep / reqirep
• retries
• rspadd
• rspdel
• rsprep / rspirep
• source
• tcp-request_inspect-delay
• timeout_client
• timeout_connect
• timeout_http-keep-alive
• timeout_http-request
• timeout_queue
• timeout_server
For detailed descriptions of these parameters, see the HAProxy documentation at http://
www.haproxy.org/download/1.8/doc/configuration.txt.
Note:
• When you configure an option that does not contain any parameters (for example, disable-on-404),
the contents of the Value field in the UI will be ignored.
290 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
• If you experience difficulty when configuring the front-end load balancer, examine the front-end load
balancer log file to help with troubleshooting.
292 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Syntax
replica set show replica_set_name
Options
replica_set_name
Specifies the name of the replica set.
Examples
The following example returns details about the ibm.com replica set:
Syntax
replica set list
Options
N/A
DRAFT - NOT FOR PUBLICATION
Examples
The following example lists all the replica sets:
Syntax
session terminate all_sessions user_id replica-set-name
Options
user_id
Specifies the name of the user. An example of user name is sec_master. Pattern matching can be
used when specifying the user name.
replica_set_name
Specifies the name of the replica set.
Examples
The following example terminates all sessions for the sec_master user in the ibm.com replica set:
The following example terminates all sessions whose user names start with sec_m in the ibm.com
replica set:
Syntax
session terminate session session-id replica-set-name
Options
session-id
Specifies the ID of a user session.
replica_set_name
Specifies the name of the replica set.
Examples
The following example terminates session 678 in the ibm.com replica set:
294 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
session list
Lists all session management sessions within the specified replica set.
Syntax
session list pattern maximum_return replica_set_name
Options
pattern
Specifies the pattern for returning user names. The pattern can include a combination of wild card and
string constant characters. The pattern is not case-sensitive. For example, you can specify *luca* or
*LUCA* as the pattern to find all users that contain the substring luca in the user name.
Note: Only the asterisk (*) character can be used as wild card.
maximum_return
Specifies the maximum number of sessions to return. When there are more matches than designated
by this option, the output contains the number of matches.
replica_set_name
Specifies the name of the replica set.
Examples
The following example (entered as one line) lists the user sessions in the ibm.com replica set for users
that contains the string ons and limits the number of matches to 100:
exit or quit
Use either the exit command or the quit command to exit from the dscadmin utility interactive
command-line mode.
Syntax
exit
quit
Options
N/A
Examples
The following example displays how to exit the dscadmin utility:
dscadmin> exit
dscadmin> quit
296 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Components
The API Access Control component is broken into three separate sub components.
Resource Servers
Each of these defines a single server that hosts the API that is being protected.
DRAFT - NOT FOR PUBLICATION
Resources
Each of these defines a single API.
Resource Access Policies
These are the authorisation policies for accessing the resource.
Authorization
The API Access Control component introduces a new objectspace named /WebSEAL_API.
The new objectspace is used to contain the protected objects that represent both resource servers and
resources (described below). The hierarchy of the protected objects in this objectspace resembles the
WebSEAL objectspace:
/WebSEAL_API/<hostname>-<instance_name>/<resource_server>/<resource>
The objectspace is managed by the API Access Control component and any requests made to a protected
API will use it in the authorization decision. The protected object used in the access control decision
depends upon the configuration of the API Access Control policy.
1. If a non default policy is applied to the API Access Control resource, the ACL and/or POP that is
attached to the resource protected object is used for the access control decision.
2. If a non default policy is applied to the API Access Control resource server, the ACL and/or POP that is
attached to the resource server protected object is used for the access control decision.
3. If the default policy is specified for the resource and resource server the ACL and/or POP that is
attached to the WebSEAL junction protected object is used for the access control decision.
The following diagram shows the flow of the protected objects that are used in an access control decision
when default policy is applied to the resource and resource server.
298 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Resource Servers
A resource server is the definition of the server that provides access to the RESTful API that is being
protected.
Each resource server corresponds to a Reverse Proxy junction. The API Access Control component
provides an extended configuration mechanism that allows more than just the standard junction
management. It provides a way to:
1. Create a basic standard junction with only the minimal required configuration or an advanced junction
creation that provides all of the standard junction create options.
2. Set the authentication options for incoming requests to the resource server.
3. Set the default authentication policy for all requests to the resource server.
4. Set static response headers that are set on every response to requests to the resource server.
The base level operations that occur internally when you creating a new resource server include the
following:
• The junction is created.
• The Reverse Proxy administrative pages root directories are updated to include new directories that are
specific to the new resource server. Pages that are specific to the resource server can be placed in these
locations.
• The Reverse Proxy configuration file is updated to include any OAuth introspection configuration as well
as static response header definitions.
• A new IBM Security Verify Access protected object is created to represent the new resource server.
• A new Access Control List (ACL) might be created to represent the authentication policy. This ACL is
then attached to the new protected object.
Note: Due to the different mix of IBM Security Verify Access operations that are performed, there are
some tasks which are completed immediately (for example, pdadmin tasks) and some tasks that are
not completed until the next commit operation is executed. This means that there might be orphaned
protected objects, ACLs and POPs if the creation is followed by a rollback of the pending changes.
Therefore, take precaution if the administrator chooses to roll back the pending changes instead of
deploying them.
Take the following actions, if a cleanup or audit of orphaned API Access Control artifacts is required:
• Objects under the /WebSEAL_API object space must be reviewed and unnecessary objects removed;
• ACLs that have a suffix of "_resource_access_control_policy" must be reviewed and unnecessary ACLs
must be removed.
Resources
A resource is the definition of the RESTful API that is being protected.
The simplistic view of an API is the combination of a HTTP method and path. For example, GET /scim/
groups.
The API Access Control component provides an extended configuration mechanism which allows more
than just the method and path to be specified. It provides a way to:
1. Create the protected object that represents the method and path.
2. Specify any URL aliases that should map to the specified path. This includes the ability to use a
wildcard character (*). These are applied through the use of a HTTP transformation rule.
3. Specify a rate limiting policy that is applied to any requests to the resource.
4. Set the authentication policy for all requests to the resource.
5. Set static response headers that are set on every response to requests to the resource. These are
applied through the use of a HTTP transformation rule.
6. Set a documentation file that can be returned when requests to the resource specify a certain
content type in the accept header. This is applied through the use of a HTTP transformation rule. See
“Resource Documentation” on page 302.
The base level operations that occur internally when creating a new resource include:
• The protected object is created.
• A new ACL may be created representing the authentication policy. This ACL is then attached to the new
protected object.
• The Reverse Proxy configuration file is updated with:
– A mapping of the resource description to the protected object name.
– Any new HTTP transformation rule specifications.
– Activation of the specified rate limiting policy.
• The rate limiting policy is updated to include the new method and path as a resource.
• A new request HTTP Transformation rule is created. This rule:
– Has a name formatted as : “Request_” + instance name + resource server path + method + path. For
example, Request_default_testGET_test.
– Contains a rule to set the protected object used for the authorisation check to the required API
Access Control protected object name.
– Map any URL aliases back to the main resource path.
– Forward the request onto the documentation file if the accept header matches the specified
documentation content type.
• A new response HTTP transformation rule is created. This rule:
– Has a name formatted as : “Response_” + instance name + resource server path + method + path.
For example, Response_default_testGET_test.
– Sets any static response headers.
The following is an example API Access Control Request Transformation Rule
(Request_default_scimGET_scim_groups):
300 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
xmlns:external="http://xsltfunctions.isam.ibm.com"
xmlns:xsl="http:/www.w3.org/1999/XSL/Transform">
<!--This stylesheet is used to set static response headers in the HTTP Response for the GET /test resource.-->
<xsl:template match="/">
<HTTPRequestChange>
<xsl:apply-templates
select="//HTTPRequest/Headers/Header[@name = 'accept']"/>
<xsl:apply-templates select="//HTTPRequest/RequestLine"/>
<!--Set the ACL bits that will be used for authorisation for this resource.-->
<AclBits>T</AclBits>
<!--Set the object name which will be used in the authorization decision.-->
<ObjectName>/WebSEAL_API/isam.test.ibm.com-default/scim/GET/scim/groups</ObjectName>
</HTTPRequestChange>
</xsl:template>
<!--Handle any URL aliasing-->
<xsl:template match="//HTTPRequest/RequestLine">
<xsl:choose>
<xsl:when test="external:matches(URI, ‘^/scim/groups/.*’)”>
<URI>
<xsl:value-of
select="external:replace(URI, ‘/scim/groups/(.*)’, ‘/scim/groups$1')"/>
</URI>
</xsl:when>
</xsl:choose>
</xsl:template>
<!--Manage any requests for documentation using the accept header.-->
<xsl:template match="//HTTPRequest/Headers/Header[@name = 'accept']">
<xsl:if test="node()=‘application/swagger.json'">
<URI>/apiac/scim/groups.json</URI>
</xsl:if>
</xsl:template>
</xsl:stylesheet>
<!--This stylesheet is used to set static response headers in the HTTP Response for the GET /test resource.-->
<!--Firstly, strip any space element-->
<xsl:strip-space elements="*"/>
<xsl:template match="/">
<HTTPResponseChange>
<Header action="add" name="Strict-Transport-Security">true</Header>
</HTTPResponseChange>
</xsl:template>
</xsl:stylesheet>
Note: Due to the different mix of IBM Security Verify Access operations that are performed, there are
some tasks which are completed immediately (for example, pdadmin tasks) and some tasks that are
not completed until the next commit operation is executed. This means that there might be orphaned
protected objects, ACLs and POPs if the creation is followed by a rollback of the pending changes.
Therefore, take precaution if the administrator chooses to roll back the pending changes instead of
deploying them.
Take the following actions, if a cleanup or audit of orphaned API Access Control artifacts is required:
• Objects under the /WebSEAL_API object space must be reviewed and unnecessary objects removed;
• ACLs that have a suffix of "_resource_access_control_policy" must be reviewed and unnecessary ACLs
must be removed.
Deletion of a resource that has a rate limiting policy applied results in the method and path being
removed from the rate limiting policy file but the policy is not removed from the Reverse Proxy
configuration file. If the rate limiting policy is no longer required, it can be manually removed from the
'[rate-limiting]' stanza of the Reverse Proxy configuration file.
Resource Documentation
IBM Security Verify Access provides the capability for a RESTful API to be extended such that a request
can be made to retrieve documentation for the API.
This is achieved through the use of a HTTP Transformation rule. The rule will look for a certain accept
header value and if it exists the documentation file which was provided during the configuration of the API
will be returned.
For example an API Access Control resource GET /scim/groups is configured with the
documentation content type set to application/swagger.json and the documentation file set
as scimgroups.json. The following CURL request returns the contents of the documentation file
scimgroups.json:
API Access Control allows the API documentation HTTP Transformation rule to be created and enabled
when you are creating or modifying a resource. Set the documentation content type and file as part of the
resource data.
The documentation files are served by the Web Reverse proxy local junction and are stored within the /
apiac directory.
The new location can be managed by using the new API Access Control management capabilities or as
part of the existing Reverse Proxy management root. The directory is created when an API resource is
first created and cannot be deleted. Files can be added directly to the /apiac directory or a complex sub
directory structure can be created.
302 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
resource_access_policy_test
resource_access_policy_test
[cors-policy:apiac_policyA]
# *************************************************************************
****************************************#
THIS STANZA IS AUTO GENERATED. PLEASE DO NOT UPDATE AS IT MAY CAUSE PROBLEMS WITH THE API ACCESS
CONTROL COMPONENT
# *************************************************************************
****************************************
handle-pre-flight = false
max-age = 0
allow-credentials = false
allow-origin = http://test.com
request-match = GET /application/endpointA HTTP/*
To create a new CORS policy, see “Creating a CORS policy” on page 318.
To add a CORS policy to an API Access Control resource, see “Create a new Resource” on page 314 and
“Modify an Existing Resource” on page 315
For more information on how the Reverse Proxy handles CORS processing, see [cors-policu:<policy-
name>] stanza and Cross-Origin Resource Sharing (CORS) support.
Configuration Auditing
When you are managing API Access Control resource servers, resources, or resource access policies there
are a number of IBM Security Verify Access operations that are performed internally.
A log file is used to audit the type of operation and who it was performed by. This file is located in the
application log files directory /isam_runtime/policy_server/api_access_control.log.
The following is an example of a log entry. It shows:
• The date and time the operation was performed.
• The name of the LMI user that performed the operation (admin).
• As this is a pdadmin operation the name of the IBM Security Verify Access user that ran the command
(sec_master).
304 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. In the appliance top menu, Web > API Access Control > Policies or Resources
Note:
• If the credentials are not already set, a dialog box is shown prompting for the username and
password. Proceed to Step 3.
• If the credentials are already set and need to be updated, proceed to Step 2.
2. Click the Set Credentials button on the toolbar to launch the dialog box.
3. Enter the username and password.
4. Optional: Enter the domain.
Note: If not specified, the domain is set to Default.
5. Click Save.
Note: The credentials are stored in memory for the life of the API Access Control servlet. The
password is obfuscated.
Procedure
1. Use the API Access Control page:
a) From the appliance dashboard, select Web > API Access Control > Resources, Policies or CORS
Policies.
b) Click the Logging button in the toolbar to view the list of internal Verify Access operations that have
been run.
2. Use the Application Log Files page:
a) From the appliance dashboard, select Monitor > Application Log Files
b) In the tree open isam_runtime > policy_server.
c) Select the api_access_control.log file.
d) Click View to see the list of internal Verify Access operations that have been run.
Procedure
1. In the appliance top menu, Web > API Access Control > Policies
2. Click Add.
A dialog box is displayed prompting for policy details.
3. Enter the name for the new policy in the Name field.
4. Add any new groups to the policy criteria by clicking the Add button in the groups toolbar.
A new dialog box is shown.
a. Select the new group from the drop-down list of all available groups.
b. Click Save.
5. Click the Remove button to remove any groups by selecting the group in the groups list.
6. Add any new attributes to the policy criteria by clicking the Add button is the attributes toolbar.
A new dialog is shown.
a. Enter the attribute name in the Name field.
b. Enter the attribute value in the Value field
c. Multiple attributes can be combined together as a single attribute definition. They are combined
using an OR condition.
1) To add more attributes click the Add button.
2) To delete an attribute click the Delete button.
d. Once the attribute definition is correct, click the Save button.
7. Click the Remove button to remove any attributes by selecting the attribute in the attribute grids.
8. Click Save.
Note:
• For the policy to allow access the user must be in at least one of the groups.
• For the policy to allow access all of the separate attribute definitions must be met.
• To view a list of all of the internal Verify Access operations that are run to create a new policy see
the api_access_control.log as described in “Auditing the Verify Access operations that are
performed when managing API Access Control components” on page 305.
Procedure
1. In the appliance top menu, Web > API Access Control > Policies
2. Select the policy to edit from the list of displayed policies and click Edit.
3. Enter the name for the new policy in the Name field.
4. Add any new groups to the policy criteria by clicking the Add button in the groups toolbar.
A new dialog box is shown.
a. Select the new group from the drop-down list of all available groups.
b. Click Save.
5. Click the Remove button to remove any groups by selecting the group in the groups list.
306 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
6. Add any new attributes to the policy criteria by clicking the Add button is the attributes toolbar.
A new dialog is shown.
a. Enter the attribute name in the Name field.
b. Enter the attribute value in the Value field
c. Multiple attributes can be combined together as a single attribute definition. They are combined
using an OR condition.
1) To add more attributes click the Add button.
2) To delete an attribute click the Delete button.
d. Once the attribute definition is correct, click the Save button.
7. Click the Remove button to remove any attributes by selecting the attribute in the attribute grids.
8. Click Save.
Note:
• For the policy to allow access the user must be in at least one of the groups.
• For the policy to allow access all of the separate attribute definitions must be met.
• To view a list of all of the internal Verify Access operations that are run to create a new policy see
the api_access_control.log as described in “Auditing the Verify Access operations that are
performed when managing API Access Control components” on page 305.
Procedure
1. In the appliance top menu, Web > API Access Control > Policies
2. To delete all existing policies, follow the steps:
a) Select all policies or select no policies.
b) Click the Delete button.
3. To delete a selection of policies, follow the steps:
a) Select the policies to delete.
b) Click the Delete button.
Note:
• Deletion of a policy deletes the ACL and POP that is associated with the policy and removes all
resource attachments.
• To view a list of all of the internal Verify Access operations that are run to create a new policy see
the api_access_control.log as described in “Auditing the Verify Access operations that are
performed when managing API Access Control components” on page 305.
Resource Servers
This section describes the procedures to manage resource servers.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on
page 305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Click Add.
A dialog box is displayed prompting for the resource server details.
5. In the API Host tab enter the details for the API host server.
a) Enter the server details by using the basic or advanced data.
For Basic Data, click the Basic Radio button
1) Enter the path prefix in the Path Prefix field. This becomes the standard junction point to
the server.
2) Enter a user friendly description for this resource server in the Description field.
3) Enter the hostname or IP address for this resource server in the Server field.
4) Enter the port for this resource server in the Port field.
5) If SSL is required check the SSL checkbox, otherwise leave it unchecked.
6) After the server and port are entered optionally, click the Load Key button to load the CA
certificate from the server into the reverse proxy keyfile.
7) For server authentication data click None if not required.
8) For server authentication data, click Client Certificate for certificate authentication and
select the certificate from the drop-down list.
9) For server authentication data, click Basic Authentication for basic authentication and
enter the username and password
For Advanced Data, click the Advanced Radio button
1) Select the Standard junction radio button to create a new standard junction.
2) Select the Virtual junction radio button to create a new virtual junction.
3) Click the Create button. This changes the dialog box to allow the advanced junction data to
be entered. See “Creating virtual junctions” on page 233 or “Creating standard junctions”
on page 234.
4) Once all the values are entered, click OK to return to the previous dialog box.
Note: At this stage the advanced junction is not yet created. Values can be changed by
clicking Create on the API Host tab again.
308 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
6. In the Authentication tab enter the details for how the OAuth token is validated.
a) To use the existing reverse proxy configuration select the Current Reverse Proxy Authentication
radio button.
b) To use an external OAuth introspection endpoint select the OAuth Introspection radio button and
enter the details.
1) Enter the URL for the introspection endpoint in the Introspection URL field.
2) After the URL is entered optionally, click the Load Key button to load the CA certificate from
the endpoint into the reverse proxy keyfile.
3) Choose the method by which the authentication data is presented to the introspection
endpoint by selecting either Basic Authentication or POST parameter from the drop-down list.
4) If the authentication data is client ID and/or client secret, click the Client Credentials radio
button and enter the Client Id and/or Client secret.
5) If the authentication data is a client ID header name, select the HTTP Header and enter the
Header Name.
6) If the mapped identity must correspond to an existing Verify Access identity, select the OAuth
Identity must correspond to a known Verify Access identity radio button. If the mapped
identity is not required to correspond to an existing Verify Access identity, select OAuth
Identity does not need to correspond to a known Verify Access identity radio button.
7) To add a new Introspection attribute definition, click the Add button in the Introspection
Response Attributes toolbar.
a) Choose whether this definition is to include or not include this attribute in the response.
b) Enter the Attribute name.
c) Click OK.
8) Click Delete to remove an Introspection attribute definition.
9) Click Move Up to move an attribute definition up in the ordered list.
7. In the policy tab select the policy that is to be attached to this resource server.
a) Use the parent policy and select the default Verify Access Policy radio button. Do not attach any
policy directly.
b) Click the No Access Permitted (disabled) radio button to not allow access.
c) Click the Unauthenticated Access Allowed radio button to allow unauthenticated access.
d) Click the Any Authenticated radio button to allow any authenticated access.
e) Click the Custom radio button to use a custom Access Control Policy. Select the custom policy
name form the drop-down list.
8. In the Response tab, set any static response headers to Create.
a) Click Add to add a new response header.
1) In the dialog box, select the Header Name or enter a new value in the Header Name field.
2) Enter the header value.
3) Click Save.
b) Click Delete to delete a response header from the header list.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. Click the icon next to the Reverse Proxy instance that holds the Resource Server.
These are the root level objects in the tree.
3. Select the resource server to modify.
4. Click Edit.
310 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
5. The API Host tab only allows the host server to be edited in advanced mode. If any of the data needs
to be edited, click the Edit button.
This changes the dialog box to allow the advanced junction data to be entered. See “Creating virtual
junctions” on page 233 or “Creating standard junctions” on page 234.
6. In the Authentication tab enter the details for how the OAuth token is validated.
a) To use the existing reverse proxy configuration select the Current Reverse Proxy Authentication
radio button.
b) To use an external OAuth introspection endpoint select the OAuth Introspection radio button and
enter the details.
1) Enter the URL for the introspection endpoint in the Introspection URL field.
2) After the URL is entered optionally, click the Load Key button to load the CA certificate from
the endpoint into the reverse proxy keyfile.
3) Choose the method by which the authentication data is presented to the introspection
endpoint by selecting either Basic Authentication or POST parameter from the drop-down list.
4) If the authentication data is client ID and/or client secret, click the Client Credentials radio
button and enter the Client Id and/or Client secret.
5) If the authentication data is a client ID header name, select the HTTP Header and enter the
Header Name.
6) If the mapped identity must correspond to an existing Verify Access identity, select the OAuth
Identity must correspond to a known Verify Access identity radio button. If the mapped
identity is not required to correspond to an existing Verify Access identity, select OAuth
Identity does not need to correspond to a known Verify Access identity radio button.
7) To add a new Introspection attribute definition, click the Add button in the Introspection
Response Attributes toolbar.
a) Choose whether this definition is to include or not include this attribute in the response.
b) Enter the Attribute name.
c) Click OK.
8) Click Delete to remove an Introspection attribute definition.
9) Click Move Up to move an attribute definition up in the ordered list.
7. In the policy tab select the policy that is to be attached to this resource server.
a) Use the parent policy and select the default Verify Access Policy radio button. Do not attach any
policy directly.
b) Click the No Access Permitted (disabled) radio button to not allow access.
c) Click the Unauthenticated Access Allowed radio button to allow unauthenticated access.
d) Click the Any Authenticated radio button to allow any authenticated access.
e) Click the Custom radio button to use a custom Access Control Policy. Select the custom policy
name form the drop-down list.
8. In the Response tab, set any static response headers to Create.
a) Click Add to add a new response header.
1) In the dialog box, select the Header Name or enter a new value in the Header Name field.
2) Enter the header value.
3) Click Save.
b) Click Delete to delete a response header from the header list.
Procedure
1. From the appliance top menu, select Web > API Access Control > Resources.
2. Click the icon next to the Reverse Proxy instance that holds the Resource Server.
3. Select the resource server to delete.
4. Click the Delete button.
Procedure
1. From the appliance top menu, Web > API Access Control > Resources.
312 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
2. If all of the resource servers for a reverse proxy are to be exported, perform the following steps:
a) Select the reverse proxy instance. These are the root level objects in the tree.
b) Click Manage > Export.
This exports a zip file that contains the API Access Control configuration for the selected resource.
3. If a single resource server is to be exported, perform the following steps:
a) Click the icon next to the Reverse Proxy instance that holds the Resource Server. These are the root
level objects in the tree.
b) Select the resource server to export.
c) Click Manage > Export.
This exports a zip file that contains the API Access Control configuration for the selected resource.
Note: The exported configuration does not contain the junction data. It only contains the API Access
Control data that is associated with a junction. For example, OAuth authentication, policy, static
response headers, and junction specific management and error pages.
Procedure
1. From the appliance top menu, select Web > API Access Control > Resources.
2. Select the reverse proxy instance. These are the root level objects in the tree.
3. Click Manage > Import.
4. In the dialog box, select the ZIP file containing the resource server data to import.
5. Click Import.
Note: The import does not create the resource server junction(s). For each resource server in the ZIP
file configuration an existing junction of the same name must exist in the target reverse proxy instance.
Procedure
1. From the appliance top menu, Web > API Access Control > Resources.
2. Select the reverse proxy instance. These are the root level objects in the tree.
3. Click Manage Management Root.
4. In the dialog box, browse to the type of page (error or management) and the locale.
In the local, there is a directory with the same name as the resource server.
5. Manage the files in the directory. See “Managing administration pages” on page 223.
Resources
This section describes the procedures to manage resources.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on
page 305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Select the required resource server to create the Resource.
5. Click Add.
A dialog box is displayed prompting for the resource server details.
6. In the Identification tab, enter the details for the new API resource.
a) Enter the user friendly description for this resource in the Name field.
b) Enter the path for this resource in the Path field.
c) Select the HTTP method for this resource from the Method drop-down list.
d) Add any path aliases that can be used for this resource to the list of URL aliases.
1) Click Add. A dialog is displayed prompting for the new alias.
2) Enter the new alias.
Note: A wildcard character (*) might be used if required.
3) Click Save.
e) Remove any path aliases by selecting the alias or aliases in the list and click the Delete button.
7. In the Policy tab, select the policy to be attached to this resource
a) Use the parent policy and select the default Verify Access Policy radio button. Do not attach any
policy directly. This will use the policy set in the resource server.
b) Click the No Access Permitted (disabled) radio button to not allow access.
c) Click the Unauthenticated Access Allowed radio button to allow unauthenticated access.
d) Click the Any Authenticated radio button to allow any authenticated access.
e) Click the Custom radio button to use a custom Access Control Policy.
f) Select the custom policy name form the drop-down list.
g) Select the rate limiting policy to be attached to this resource by using the Rate Limiting Policy
dropdown.
h) Select the CORS policy to be attached to this resource by using the CORS Policy dropdown.
8. In the Responses tab, set any static response headers to create.
a) Click Add to add a new response header.
1) In the dialog box, select the Header Name or enter a new value in the Header Name field.
2) Enter the Header Value.
3) Click Save.
b) To delete a response header select the header from the list and click Delete.
314 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
9. In the Documentation tab, enter the settings to allow the resource documentation to be returned.
a) Enter the content type that can be used to retrieve the documentation. For example,
application/swagger.json. If a request to the resource contains this value in the accept
header, the documentation file is returned.
b) Select the documentation file from the drop-down list. If it does not exist click the upload
button to select and upload the file. These files can be managed by using “Manage the API
documentation root” on page 318.
10. Once all of the data are set, click Save to create the new resource.
What to do next
To view a list of the operations that are run to create a new resource, see the
api_access_control.log as described in “Auditing the Verify Access operations that are performed
when managing API Access Control components” on page 305.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on
page 305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Expand the resource server to show the list of existing resources.
5. Select the resource to modify.
6. Click Edit.
A dialog box is displayed showing the existing resource details.
7. In the Identification tab, enter the details for the new resource.
a) Enter the user friendly description for this resource in the Name field.
b) Add any path aliases that can be used for this resource to the list of URL aliases.
1) Click Add. A dialog is displayed prompting for the new alias.
2) Enter the new alias.
Note: A wildcard character (*) might be used if required.
3) Click Save.
c) Remove any path aliases by selecting the alias or aliases in the list and click the Delete button.
Procedure
1. From the appliance top menu, select Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on page
305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Expand the resource server to show the list of existing resources.
5. Select the resource to modify.
6. Click Delete.
316 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
What to do next
To view a list of the IBM Security Verify Access operations that are run to create a new resource, see the
api_access_control.log as described in “Auditing the Verify Access operations that are performed
when managing API Access Control components” on page 305.
Procedure
1. From the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on page
305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Perform one of the following options:
If all of the resources for a reverse proxy are to be exported
a. Select the resource server.
b. Click Manage > Export. This exports a zip file containing the API Access Control configuration
for the resource server and all of its resources.
If a single resource is to be exported
a. Expand the Resource Server to show the existing resources.
b. Select the resource to export
c. Click Manage > Export. This exports a zip file containing the API Access Control configuration
for the selected resource.
Procedure
1. In the appliance top menu, Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on page
305.
3. Expand the Reverse Proxy instance to show the list of available resource servers.
These are the 2nd level objects in the tree.
4. Select the target resource.
5. Click Manage > Import.
What to do next
To view a list of the IBM Security Verify Access operations that are run to create a new resource, see the
api_access_control.log as described in “Auditing the Verify Access operations that are performed
when managing API Access Control components” on page 305.
Procedure
1. From the appliance top menu, select Web > API Access Control > Resources.
2. The user is prompted to set the user name, password, and domain for the Policy Server if these
credentials are not already set.
See “Storing the IBM Security Verify Access operations for managing Access Control Policies” on page
305.
3. Select the reverse proxy instance.
These are the 2nd level objects in the tree.
4. Click Manage > API Documentation Root.
5. In the dialog, create, delete, rename, import files, and directories.
Procedure
1. In the appliance top menu, Web > API Access Control > CORS Policies
2. Click Add.
A dialog box is displayed prompting for policy details.
3. Enter the name for the new CORS policy in the Name field.
318 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
<protocol>://<hostname>:<port>
Procedure
1. In the appliance top menu, Web > API Access Control > CORS Policies
2. Select the policy to modify from the list.
3. Click Edit.
A dialog box is displayed showing the current settings.
4. Enter the Access Control settings in the Access Control tab.
a) Select whether or not to set the Access-Control-Allow-Credentials header by using the
Allow Credentials checkbox.
b) Add any allowed origins to the policy by clicking the Add button in the Allowed Origins toolbar. A
new dialog box is shown.
1) Enter the new origin in the Name field. This value can be either “*” to allow all origins or an
individual origin of the form.
<protocol>://<hostname>:<port>
320 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. In the appliance top menu, Web > API Access Control > CORS Policies.
2. To delete all existing policies, click Delete without selecting a policy from the list. This opens a
confirmation dialog.
a) Confirm the deletion by clicking the Delete button.
b) Cancel the deletion by clicking the Cancel button.
3. To delete one existing policy, select the policy to from the list and click the Delete button. This opens a
confirmation dialog.
a) Confirm the deletion by clicking the Delete button.
b) Cancel the deletion by clicking the Cancel button.
Note:
• Deleting a CORS policy results in all the API Access Control resource CORS policy references being
deleted also. This means the reverse proxy configuration files are updated to remove the CORS
policy stanzas for the deleted policies.
• To view a list of all of the internal Verify Access operations that are run to create a new CORS policy
see the api_access_control.log as described in “Auditing the Verify Access operations that are
performed when managing API Access Control components” on page 305.
322 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Accessibility features
Security Verify Access includes the following major accessibility features:
Accessibility features
Supports interfaces commonly used by screen readers. This feature applies to applications on Windows
operating systems only.
Supports customization of display attributes such as color, contrast, and font size.
Supports interfaces commonly used by screen magnifiers. This feature applies to applications on
Windows operating systems only.
Allows the user to access the interfaces without inducing seizures due to photosensitivity.
Security Verify Access uses the latest W3C Standard, WAI-ARIA 1.0 (http://www.w3.org/TR/wai-aria/),
to ensure compliance to US Section 508 (http://www.access-board.gov/guidelines-and-standards/
communications-and-it/about-the-section-508-standards/section-508-standards), and Web Content
Accessibility Guidelines (WCAG) 2.0 (http://www.w3.org/TR/WCAG20/). To take advantage of accessibility
features, use the latest release of your screen reader in combination with the latest web browser that is
supported by this product.
The Security Verify Access online product documentation in IBM Knowledge Center is enabled for
accessibility. The accessibility features of IBM Knowledge Center are described at https://www.ibm.com/
support/knowledgecenter/help?view=kc#accessibility.
Keyboard navigation
This product uses standard navigation keys.
Interface information
The Security Verify Access user interfaces do not have content that flashes 2 - 55 times per second.
The Security Verify Access web user interfaces and the IBM Knowledge Center rely on cascading style
sheets to render content properly and to provide a usable experience. The application provides an
equivalent way for low-vision users to use a user’s system display settings, including high-contrast mode.
You can control font size by using the device or web browser settings.
The Security Verify Access web user interface includes WAI-ARIA navigational landmarks that you can
use to quickly navigate to functional areas in the application.
DRAFT - NOT FOR PUBLICATION
324 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
B
backup 3, 168
A
C
accessibility features for this product 323
account management 100 CA paths 264, 268
activation 26 cable connections 5
administration 3 certificates
administration pages root databases
directories 223 adding description 115
files 223 creating 115
advanced configuration files 243 deleting 117
advanced tuning 101 exporting 117
advanced tuning parameters 198, 201 importing 116
alerts listing 115
emails 108 naming 116
remote syslog 108 replicating 117
SNMP 107 expiry 43
analysis 45 personal 119
appliances requests 122
change commit process 38, 189 signer 118
clusters 245 change
disk space usage 3 passwords 92
front-end load balancers 281, 282 changes
hardware 5 configuration 38, 189, 216
installation 6 debug levels 202
management 33, 33, 37 federated directory configuration 203
management interface 201 front-end load balancers 281
RESTful web services 37 passwords 201
runtime environment component 197 runtime configuration 193
setup wizard 25 CLI
snapshots 168 logging 275
tasks 5 clusters
updating 38, 189 data
application layer 283 loss 170
applications replication 159, 159, 159, 162
databases 110 Distributed Session Cache 245
interface 48, 60 external reference entity (ERE) 162
locale 112 failure 161, 164
logs 49, 112 maintenance 167
statistics 48 masters 157, 160, 169
applying changes 193 nodes
architecture rules 168 availability 169
authentication identifiers 169
enabling 236 master nodes 164, 166, 168
mutual 201 registration 72, 166, 169
paths 264, 268 rules 168, 168
settings 269 services 160
testing 264 support 157
authorization servers command-line interface 24, 33
configuration files 243 commit process 38, 189
deleting 242 common tasks 24
editing 243, 243 components
log files 278 compress 271
management 271 flush intervals 271
restarting 243 modifying statistics settings 227
starting 243 rollover size 271
stopping 243 runtime 193, 201
auto updating 110 trace levels 271
Index 325
DRAFT - NOT FOR PUBLICATION
326 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
G domains 267
keytab files 264, 269
geolocation data 157, 159, 161 realms 266
getting started 5 settings 264
groups 100 keytab files 264, 269
gw_net.tuning.downdelay 101 KVM 9
gw_net.tuning.miimon 101
gw_net.tuning.updelay 101
gw_net.tuning.use_carrier 101
L
gw_net.tuning.xmit_hash_policy 101 layer 7
benefits 284
H HTTP cookies 283
load balancing 283
hardware appliances 5, 5, 5, 24 SSL proxy 285
headers 37 SSL termination 284
health status 230, 231 stickiness 283
high availability 162, 231, 281 LDAP
history 56 administration 201
hosts log levels 202
files 68 management 201
names 24 servers 201
HTTP headers SSL
identities 236 settings 203
requests 284 support 201
responses 284 suffixes 202
Hyper-V 11 LDAP PIP 114
LDAP policy information point 114
LDAP server 114
I license
IBM Security Access Manager agreement 24
environments 281 calculation 22
IBM Security Verify Access installation 57
environment 271 metric tool 22
installation overview 53
fix packs 56 support 26
license 57 updates 53
instances listing
deleting 242 file sizes 275
editing 243, 243 names of log files 275
restarting 205, 243 session management sessions 293, 295
showing current state 227 LMI
starting 205, 243 administrator settings 92
stopping 205, 243 appliance setup wizard 25
unconfiguring 207 cluster configuration 159
intermediate files 106 commit process 38, 189
IP addresses 42, 169 configure hardware appliances 5
Kerberos configuration 264
license installation 57
J logging on 33
restricted nodes 167
Java
reverse proxy management 205
extension points 198
supported browsers 33
junctions
load balancers
graphs 231
configuration 282, 285
health status 230
front-end 281, 285
standard 236
health status 231
virtual 236
layer 7 284
JVM debugging 198
layers 283, 283
network termination 284
K local management interface
cluster configuration 164, 166
Kerberos See also LMI
CA paths 268 log files
default values 265 authorization 278
Index 327
DRAFT - NOT FOR PUBLICATION
clearing 276 O
exporting 275
management 275 objects
names 275 email alerts 108
reverse proxy 277 log alerts 108
statistics 227 offline 110
viewing snippets 275 OSI network model 283
log levels overview 53
customizing 202
LDAP servers 202
logging 275, 276
P
logs packet tracing 70
files 106, 108, 112 partitions 43, 47, 57
response objects 108 password management 201
LTPA keys passwords 24, 92
files 236 patches 56
persistence 281, 283
M policy servers
editing 272
maintenance 167 management 193
management primary masters 117, 157
applications Process Value Unit (PVU) report 22
logs 49 product activation 26
authentication 95 promotion 72, 164
certificates
personal 119
requests 122
Q
signer 118 quaternary masters 157
SSL 100, 114 quitting 295
file downloads 124
groups 100
hosts files 68 R
interface 60
realms
packet tracing 70
authentication 264, 268
roles 97
domains 264, 267
settings
management 266
secure 114
names 264
systems 53
properties 267
users 100
servers 264
master ERE 162
redirection 66
master nodes 72, 157
references
memory statistics 46
cluster configuration 76
metadata
databases 83
user registries 201
session cache 77
registration 72, 169
N replica sets
listing 293, 295
network management 245
settings 59, 285 session termination 294, 294
termination 284 showing 293
traffic 43 replicating SSL certificates 117, 159
nist.sp800-131a.strict 101 replication
nodes syncing 202
clusters 157 response objects
failure 164 emails 108
promotion 72, 164 logs 108
restricted 167 SNMP 107
notifications 41, 107, 108 restarting 110
NTP servers 92 RESTful web services 37
restricted nodes 167
reverse proxy
configuration 216
federation configuration 239, 240
328 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
Index 329
DRAFT - NOT FOR PUBLICATION
TCP
header information 283, 283
W
layers 283 web
levels 285 content 232
temporary files 106 servers
terminal emulation 5 principals 264
termination services 38, 189
networks 284 Web Portal Manager 247
sessions 294, 294 Web Reverse Proxy
tertiary masters 157 configuration
threat protection 54 environments 281
time zones 92 files 216
trace inspections 232
components 271 log files
configuration files management 275
editing 243, 272 malicious requests 232
updating 273 management 223
control 271 servers 281, 284
data 271 transaction logs 231
files 271 Web Security Gateway Appliance
function calls 202 reverse proxy log files 275
levels 271 statistics 227
traffic tracing 271
reverse proxy 229 web services
transaction logging components 231, 276 error responses 37
troubleshooting support files 106 required headers 37
tuning parameters 159 WebSEAL
instances
U display 230
servers 236
updates sessions 283
application databases 110
auto updating 110
changes 168
X
firmware 53, 57, 167 X-Force signatures 54
history 56
intrusion prevention 53
licensing 53
overview 53
schedules 54
servers 54, 54
URL categorization 110
330 IBM Security Verify Access Version 10.0.1 December 2020: Administration topics
DRAFT - NOT FOR PUBLICATION
IBM®