IBM Support

PM70885: THE WS-SECURITY JAX-WS KERBEROS TOKEN GENERATOR DOES NOT ALLOW CUSTOMIZATION THROUGH THE SHARED STATE

Fixes are available

7.0.0.27: WebSphere Application Server V7.0 Fix Pack 27
8.5.0.2: WebSphere Application Server V8.5 Fix Pack 2
8.0.0.6: WebSphere Application Server V8.0 Fix Pack 6
7.0.0.29: WebSphere Application Server V7.0 Fix Pack 29
8.0.0.7: WebSphere Application Server V8.0 Fix Pack 7
8.0.0.8: WebSphere Application Server V8.0 Fix Pack 8
7.0.0.31: WebSphere Application Server V7.0 Fix Pack 31
7.0.0.27: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.33: WebSphere Application Server V7.0 Fix Pack 33
8.0.0.9: WebSphere Application Server V8.0 Fix Pack 9
7.0.0.35: WebSphere Application Server V7.0 Fix Pack 35
8.0.0.10: WebSphere Application Server V8.0 Fix Pack 10
7.0.0.37: WebSphere Application Server V7.0 Fix Pack 37
8.0.0.11: WebSphere Application Server V8.0 Fix Pack 11
7.0.0.39: WebSphere Application Server V7.0 Fix Pack 39
8.0.0.12: WebSphere Application Server V8.0 Fix Pack 12
7.0.0.41: WebSphere Application Server V7.0 Fix Pack 41
8.0.0.13: WebSphere Application Server V8.0 Fix Pack 13
7.0.0.43: WebSphere Application Server V7.0 Fix Pack 43
8.0.0.14: WebSphere Application Server V8.0 Fix Pack 14
7.0.0.45: WebSphere Application Server V7.0 Fix Pack 45
8.0.0.15: WebSphere Application Server V8.0 Fix Pack 15
7.0.0.27: Java SDK 1.6 SR12 Cumulative Fix for WebSphere Application Server
7.0.0.29: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.45: Java SDK 1.6 SR16 FP60 Cumulative Fix for WebSphere Application Server
7.0.0.31: Java SDK 1.6 SR15 Cumulative Fix for WebSphere Application Server
7.0.0.35: Java SDK 1.6 SR16 FP1 Cumulative Fix for WebSphere Application Server
7.0.0.37: Java SDK 1.6 SR16 FP3 Cumulative Fix for WebSphere Application Server
7.0.0.39: Java SDK 1.6 SR16 FP7 Cumulative Fix for WebSphere Application Server
7.0.0.41: Java SDK 1.6 SR16 FP20 Cumulative Fix for WebSphere Application Server
7.0.0.43: Java SDK 1.6 SR16 FP41 Cumulative Fix for WebSphere Application Server

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • A fully-formed SAML token can be can be put in the sharedState
    by a login module and the SAMLGenerateLoginModule will use that
    token as if it were built by itself.  This allows the SAML token
    generator to send tokens built dynamically by a stacked login
    module.  There is no method for this same kind of customization
    with the Kerberos token generator.  The username and password
    must be hardcoded in the Kerberos token callback handler.  If
    the username and password needs to be set dynamically, there is
    no way to do this.
    

Local fix

Problem summary

  • ****************************************************************
    * USERS AFFECTED:  IBM WebSphere Application Server            *
    *                  developers of WS-Security enabled JAX-WS    *
    *                  applications                                *
    ****************************************************************
    * PROBLEM DESCRIPTION: The WS-Security Kerberos token          *
    *                      generator cannot accept an              *
    *                      application specified username and      *
    *                      password                                *
    ****************************************************************
    * RECOMMENDATION:  Install a fix pack that contains this       *
    *                  APAR.                                       *
    ****************************************************************
    A fully-formed SAML token can be can be put in the sharedState
    by a login module and the SAMLGenerateLoginModule will use
    that token as if it were built by itself.  This allows an
    application developer to build SAML tokens dynamically instead
    of having to use hardcoded values in the callback handler.
    Although you can dynamically pass a username and password to
    the KRBGenerateLoginModule when using WSSAPIs, if you must use
    policy sets and bindings, there is no way to pass dynamic
    information to the Kerberos token generator.
    

Problem conclusion

  • The WS-Security runtime is updated to allow an application
    developer to dynamically set the username and password that
    the KRBGenerateLoginModule uses when generating a token.
    
    Two new methods are added to
    com.ibm.websphere.wssecurity.wssapi.token.GenericSecurityTokenFa
    ctory
    
    UsernameToken getSimpleUsernameToken(String username);
    UsernameToken getSimpleUsernameToken(String username, char[]
    password);
    
    
    An application developer can pass custom data to the
    KRBGenerateLoginModule in two ways in this priority order:
    
    1) From the sharedState from a stacked JAAS login module
    2) From the com.ibm.wsspi.wssecurity.token.tokenHolder list
    on the message context
    
    Refer to the following constants in
    com.ibm.wsspi.wssecurity.core.Constants for more information:
    
    com.ibm.wsspi.wssecurity.token.tokenHolder
    com.ibm.wsspi.wssecurity.token.enableCaptureTokenContext
    
    An application developer can change the username and password
    that is used by KRBGenerateLoginModule to obtain the Kerberos
    ticket.  When a simple UsernameToken has been provided for use
    by KRBGenerateLoginModule, it will override what is configured
    in the callback handler.
    
    Here is an example of code that would go in a stacked login
    module in the login() method.  _sharedState comes from the
    first Map parameter on the initialize method in the login
    module.
    
    import
    com.ibm.websphere.wssecurity.wssapi.token.GenericSecurityTokenFa
    ctory;
    import com.ibm.websphere.wssecurity.wssapi.token.UsernameToken;
    
    public boolean login() throws LoginException {
    //get the factory
    GenericSecurityTokenFactory factory =
    GenericSecurityTokenFactory.getInstance();
    
    UsernameToken unt = factory.getSimpleUsernameToken("username",
    "password".toCharArray());
    
    factory.putGeneratorTokenToSharedState(_sharedState, unt);
    
    return true;
    }
    
    
    KRBConsumeLoginModule has also been updated so that a Kerberos
    token that is consumed is available on the shared state for
    use by a stacked login module.  The token can be obtained with
    the following method from the GenericSecurityTokenFactory:
    
    SecurityToken token =
    factory.getConsumerTokenFromSharedState(_sharedState,
    com.ibm.websphere.wssecurity.wssapi.token.KRB5_APREQToken.ValueT
    ype);
    
    Note that the valueType specified should correspond to the
    valueType of the Kerberos token that is configured.  If it
    does not, no token will be returned.
    
    The fix for this APAR is currently targeted for inclusion in
    fix pack 7.0.0.27, 8.0.0.6, 8.5.0.2.  Please refer to the
    Recommended Updates page for delivery information:
    http://www.ibm.com/support/docview.wss?rs=180&uid=swg27004980
    

Temporary fix

Comments

APAR Information

  • APAR number

    PM70885

  • Reported component name

    WEBSPHERE APP S

  • Reported component ID

    5724J0800

  • Reported release

    800

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt

  • Submitted date

    2012-08-14

  • Closed date

    2012-10-15

  • Last modified date

    2012-10-15

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    WEBSPHERE APP S

  • Fixed component ID

    5724J0800

Applicable component levels

  • R700 PSY

       UP

  • R800 PSY

       UP

  • R850 PSY

       UP

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSEQTP","label":"WebSphere Application Server"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"8.0","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
29 October 2021