Access with authorization delegated to Decision Center

You configure security access for your users and delegate authorization to Decision Center.

To configure security access with authorization delegated to Decision Center, you must:
  • Establish the user registry, for example a connection to an LDAP or a basic file-based registry.
  • Set the security realm to authenticate all users and delegate authorization to Decision Center
  • Create an administrative user in the user registry to complete the initial Decision Center configuration.
Decision Center makes use of roles to determine what an authenticated user is authorized to access when logging in. Decision Center has the following predefined roles:
  • rtsAdministrator - Administrator access.
  • rtsInstaller - Access to the Installation Settings Wizard in the Enterprise console.
  • rtsConfigManager - Configuration manager access.
  • rtsUser - Standard access.

After configuring security access to Decision Center, you complete the configuration of Decision Center. Then, you must create users and groups in the Decision Center database to make use of security and fined grained permissions (see Managing users from Decision Center.)

Note: If you customize the Decision Center UI to create new roles, you can upload these new roles to the Decision Center database directly. You do not have to upload the predefined roles to the Decision Center database.

Step 1: Establish the user registry

Every Decision Center user must be present in both:
  • A registry of users from which the application server authenticates access to Decision Center.
  • The Decision Center database, so that each authenticated user can receive a permission profile from Decision Center.
In the application server, you establish this user registry in <WLP_HOME>/usr/servers/<SERVER_NAME>/server.xml. For example:
  • For a basic registry, add your groups and user/passwords.
  • For an LDAP, establish the connection with your users and groups.

Examples are provided at the end of this topic.

Step 2: Set the security realm

You must set the security realm so that the application server authenticates users and delegates authorization to Decision Center.

To do so, use the special subject feature for Liberty (see WebSphere: Authorization). Specifically, modify <WLP_HOME>/usr/servers/<SERVER_NAME>/server.xml for both teamserver.war and decisioncenter.war so that all authenticated users have the role rtsUser:

<!-- Business console -->
<application type="war" id="decisioncenter" name="decisioncenter" location="${server.config.dir}/apps/decisioncenter.war">
<application-bnd>
<security-role name="rtsAdministrator">
<group name="AdminGroup"/>
</security-role>
<security-role name="rtsInstaller">
<group name="InstallGroup"/>
</security-role>
<security-role name="rtsUser">
<special-subject type="ALL_AUTHENTICATED_USERS" />
</security-role>
</application-bnd>
</application> 
Note: Add the same security-role information for the Enterprise console application: <application type="war" id="teamserver" name="teamserver" location="${server.config.dir}/apps/teamserver.war">.

Users from the user registry are all authenticated to log in to both Decision Center consoles, and are authorized the features of a basic user.

Step 3: Declare a user to complete the Decision Center configuration

You must create a user to complete the configuration of Decision Center. This user must have the rights of both rtsAdministrator and rtsInstaller.

The following table indicates the roles required for a user to complete the configuration.

Role Use Example group name, user/password combination
rtsAdministrator Gives the user administrator access. AdminGroup, rtsAdmin/rtsAdmin
rtsInstaller Gives the user access to the Installation Settings Wizard in the Enterprise console, to complete the configuration. InstallGroup, rtsAdmin/rtsAdmin
To declare a user to complete the configuration, modify <WLP_HOME>/usr/servers/<SERVER_NAME>/server.xml. For example:
  • For a basic registry, add or replace <basicRegistry> as follows:
    <basicRegistry id="basic" realm="customRealm">
        <user name="rtsAdmin" password="rtsAdmin"/>
        <group name="AdminGroup">
                <member name="rtsAdmin"/>
        </group>
        <group name="InstallGroup">
                <member name="rtsAdmin"/>
        </group>        
    </basicRegistry>
  • For an LDAP:
    <!-- Business console -->
    <application type="war" id="decisioncenter" name="decisioncenter" location="${server.config.dir}/apps/decisioncenter.war">
      <application-bnd>
      <security-role name="rtsAdministrator">
        <group name="AdminGroup"/>
    	       id="AdminGroup"
    	       access-id="group:MyRealm/CN=AdminGroup,ou=Groups,dc=example,dc=com"/>
      </security-role>
      <security-role name="rtsInstaller">
        <group name="InstallGroup"/>
    	       id="InstallGroup"
    	       access-id="group:MyRealm/CN=InstallGroup,ou=Groups,dc=example,dc=com"/>
      </security-role>
      <security-role name="rtsUser">
        <special-subject type="ALL_AUTHENTICATED_USERS" />
      </security-role>
      </application-bnd>
    </application>