From IBM WebSphere Traditional V9.x Security Technical Implementation Guide
Part of SRG-APP-000149-AS-000102
Associated with: CCI-000187 CCI-000765 CCI-000767 CCI-001184 CCI-001953 CCI-001954 CCI-002009 CCI-002010 CCI-002011
Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target. Unlike a simple username/password scenario where the attacker could gain access by knowing both the username and password without the user knowing his account was compromised, multifactor authentication adds the requirement that the attacker must have something from the user, such as a token, or to biometrically be the user.
Check that the admin console is enabled for client certificate logon.
In the Deployment Manager, check the file on:
From the admin console, select System Administration >> Deployment Manager >> Java and Process Management >> Process definition >> Java Virtual Machine >> Custom Properties.
Select "New".
Insert the following case sensitive value into the "Name" field: "adminconsole.certLogin".
Select "Value".
Enter "true".
Click "Apply".
Click "Save".
Select Security >> SSL Certificate and Key management >> SSL Configurations >> Select CellDefaultSSLSettings >> Quality of Protection (QOP) settings.
In the "Client Authentication" drop-box, make sure "Supported" or "Required" is selected.
Click "Apply".
Click "Save".
Save a backup copy and edit the "Web.xml" file as follows:
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer