The WebSphere Application Server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.

From IBM WebSphere Traditional V9.x Security Technical Implementation Guide

Part of SRG-APP-000402-AS-000247

Associated with: CCI-002009

SV-96081r1_rule The WebSphere Application Server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.

Vulnerability discussion

Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials. PIV credentials are only used in an unclassified environment.Access may be denied to authorized users if federal agency PIV credentials are not accepted to access the management interface.

Check content

Check that the admin console is enabled for client certificate logon. In the Deployment Manager, check the file on: /profiles//config/cells//applications/isclite.ear/deployments/isclite/isclite.war/WEB-INF/web.xml. If the XML element "FORM" is present, this is a finding.

Fix text

From the admin console, select System Administration >> Deployment Manager >> Java and Process Management >> Process definition >> Java Virtual Machine >> Custom Properties. Select "New". Insert the following case sensitive value into the "Name" field: "adminconsole.certLogin" Select "Value". Enter "true". Click "Apply". Click "Save". Select Security >> SSL Certificate and Key management >> SSL Configurations >> Select CellDefaultSSLSettings >> Quality of Protection (QOP) settings. In the "Client Authentication" drop box, make sure "Supported" or "Required" is selected. Click "Apply". Click "Save". Save a backup copy and edit the Web.xml file as follows: /profiles//config/cells//applications/isclite.ear/deployments/isclite/isclite.war/WEB-INF/web.xml: --- Change: < security-constraint> Protected Area / --- So it becomes: < security-constraint> Protected Area / /logon.jsp /logonError.jsp --- Add these security constraints if not already present: free pages /*.jsp /css/* /images/* /j_security_check --- Change: FORM to CLIENT-CERT Save the "web.xml" file. Stop and restart the Deployment Manager. Log on to the admin console using your certificate.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer