Important: This guide has been archived. While the content in this guide is still valid for the products and versions listed in the document, it is no longer being updated and may refer to F5 or third party products or versions that have reached end-of-life or end-of-support.

Deployment Guide Document version 1.0

For a list of current guides, see https://f5.com/solutions/deployment-guides.

What's inside:

2 Configuration example 3 Configuring the BIG-IP System for WebSEAL 3 Replicating front-end WebSEAL servers

Deploying the BIG-IP system with IBM Security Access Manager

ch iv ed

2 Prerequisites and configuration notes

Welcome to the F5 deployment guide for IBM® Security Access Manager (SAM, formerly Tivoli Access manager or TAM). This guide shows how to configure the BIG-IP Local Traffic Manager (LTM) and BIG-IP Application Acceleration Manager (AAM) with IBM Security Access Manager.

8 Document Revision History

Deploying the BIG-IP system in front of WebSEAL completes the highly available, secure, manageable and fast architecture required by any enterprise or business.

5 Next steps

Ar

7 Troubleshooting

When deploying IBM Identity Management, WebSEAL is a critical component of the deployment and should be designed with a high availability architecture. WebSEAL communicates with the Secure Access Manager Policy Server and provides web proxy functionality. The BIG-IP system configuration for WebSEAL is primarily focused on SSL offload, load balancing, acceleration, and security.

Why F5

Using BIG-IP with SAM brings a host of benefits that complement WebSEAL's functionality. • B  IG-IP Local Traffic Manager (LTM) provides high availability for your WebSEAL environments by using health checks to direct traffic to a WebSEAL server that is available.  IG-IP LTM SSL offload brings step-down authentication capability to your WebSEAL • B deployments. By using 2048 or larger keys using ECC technology on the BIG-IP system, users can realize the strongest possible encryption while BIG-IP uses more efficient 1024 keys for communication with WebSEAL. • B  IG-IP Application Acceleration Manager (AAM) can provide content caching and intelligent browser referencing (IBR) to accelerate the user experience for the content that your WebSEAL proxies are serving. BIG-IP AAM dynamically manages expires headers, provided content caching and intelligently manages content with browsers, reducing the total number of HTTP connections between browser and server, among other acceleration features. For more information on Security Access Manager (formerly IBM Tivoli Access Manager,) see http://www-03.ibm.com/software/products/us/en/identity-access-manager For more information on the F5 BIG-IP system, see http://www.f5.com/products/big-ip/

DEPLOYMENT GUIDE IBM Security Access Manager

Products and versions Product

Version

BIG-IP LTM and AAM

11.4

IBM Security Access Manager for Web

7.0

Important: M  ake sure you are using the most recent version of this deployment guide, available at http://www.f5.com/pdf/deployment-guides/ibm-security-access-manager-dg.pdf.

Prerequisites and configuration notes

ch iv ed

The following are general prerequisites and configuration notes for this guide: hh In order to use the BIG-IP Application Acceleration Manager (AAM), it must be fully licensed and provisioned on the BIG-IP system. hh If you are using the BIG-IP system to offload SSL or for SSL re-encryption (SSL Bridging), you must have already obtained a valid SSL certificate and key, and it is imported it onto the BIG-IP LTM system. For specific instructions on importing SSL certificates and keys, see the online help or BIG-IP system documentation, available at http://support.f5.com/kb/en-us.html hh T his document is intended for the load balancing and acceleration of WebSEAL components. WebSEAL should be configured and functional on your network

Ar

hh T his document focuses on the availability of the proxy features of WebSEAL. It is not concerned with the load balancing or acceleration of the administration functions of WebSEAL.

Configuration example The following simple configuration example shows the BIG-IP system with LTM and AAM modules in front of a pool of WebSEAL devices. One of the core components of the BIG-IP system is providing high availability. In this implementation, after checking server health the BIG-IP LTM distributes user traffic to the WebSEAL server with the fewest connections. Because the user could be sent to any of the WebSEAL devices that are a part of this configuration, it is best practice that all the servers are identical. See the following section for more information on replicating the WebSEAL servers.

Clients

Load Balancing, Acceleration, Availability

LTM

AAM

BIG-IP Platform

Figure 1: Logical configuration example

2

WebSEAL

Policy Server

DEPLOYMENT GUIDE IBM Security Access Manager

Configuring the BIG-IP System for WebSEAL In this section, we describe how to replicate front-end WebSEAL servers, as well as how to configure the BIG-IP system for WebSEAL.

Replicating front-end WebSEAL servers Because it is best practice that all the WebSEAL servers are identical (as described in the Configuration example section), In this procedure, we show you how to replicate front-end WebSEAL servers. For specific instructions, see the IBM documentation. In this example, the host name of the primary WebSEAL server machine is WS1. The host name for the replica WebSEAL server machine is WS2. To replicate the front-end WebSEAL servers

ch iv ed

1. Install and configure WebSEAL on both the primary and replica server machines (WS1 and WS2 in our example). 2. C  reate a new object to be the root of the authorization space for both WebSEAL servers using the pdadmin command as shown in the For example: pdadmin> object create /WebSEAL/newroot "Description" 5 ispolicyattachable yes

3. Stop WebSEAL on the primary server (WS1 in our example). 4. O  n the primary server, change the value of the server-name stanza entry in the WebSEAL configuration file from the original host name (WS1 in our example) to newroot: [server] server-name = newroot

5. Restart WebSEAL on the primary server.

Ar

6. Repeat Steps 3-5 for the replica server (WS2 in our example).

The primary and replica servers now use the object /WebSEAL/newroot as the base for authorization evaluations. Either server can respond to object list and object show commands for objects located below /WebSEAL/newroot.

3

DEPLOYMENT GUIDE IBM Security Access Manager

Configuring the BIG-IP system Use the following table for guidance on configuring the BIG-IP LTM for WebSEAL. This table contains any non-default setting you should configure as a part of this deployment. Settings not contained in the table can be configured as applicable. For specific instructions on configuring individual objects, see the online help or product manuals. BIG-IP Object

Non-default settings/Notes Name

Type a unique name

Health Monitor1

Type

HTTP

(Local Traffic > Monitors)

Interval

30 (recommended) 91 (recommended) Type a unique name

Health Monitor

Select the monitor you created above

Slow Ramp Time2

300

Load Balancing Method

Choose Least Connections (Node)

Address

Type the IP Address of a WebSEAL server

Service Port

80 if offloading SSL, 443 if not Repeat Address and Service Port for all nodes

Optional: BIG-IP AAM

Application Name

Type a unique name

Policy

Select Generic Policy - Complete

(Acceleration > Web Application > Application)

Requested Host

Type the domain name (host name) that might appear in HTTP requests for WebSEAL. Click Add Host to include additional host names.

ch iv ed

Timeout Name

Pool

Ar

(Local Traffic > Pools)

Profiles (Local Traffic-->Profiles)

Name

Type a unique name

HTTP (Profiles-->Services)

Parent Profile

http

Insert X-Forwarded-For

If you are using SNAT (recommended): Enabled

HTTP Compression (Profiles-->Services)

Name

Type a unique name

Parent Profile

httpcompression

TCP WAN (Profiles-->Protocol)

Name

Type a unique name

Parent Profile

tcp-wan-optimized

TCP LAN (Profiles-->Protocol)

Name

Type a unique name

Parent Profile

tcp-lan-optimized

Name

Type a unique name

Parent Profile

webacceleration

WA Applications

Enable your BIG-IP AAM application

Name

Type a unique name

Parent Profile

clientssl

Certificate and key

Select the Certificate and key you imported for this implementation

Name

Type a unique name

Parent Profile

If your server is using a certificate signed by a CA, select serverssl. If your server is using a self-signed certificate, or an older SSL cipher, select serverssl-insecure-compatible.

Certificate and Key

Leave Certificate and Key set to None.

Web Acceleration 3 (Profiles-->Protocol)

Client SSL (Profiles-->SSL)

Server SSL (for SSL Bridging only) (Profiles-->SSL)

1 2 3

4

To make this monitor more sophisticated, see Adding enhanced monitoring to the implementation on page 6 You must select Advanced from the Configuration list for these options to appear Optional: Only necessary if you are deploying the BIG-IP AAM

DEPLOYMENT GUIDE IBM Security Access Manager

BIG-IP Object

Non-default settings/Notes Name

Type a unique name.

Address

Type the IP Address for this virtual server

Service Port

Virtual Server (Main tab-->Local Traffic -->Virtual Servers)

1 2

Select the WAN optimized TCP profile you created above

Protocol Profile (Server) 1

Select the LAN optimized TCP profile you created above

Web Acceleration Profile 2

Select the Web Acceleration profile you created above

Source Address Translation

Auto Map 3

Default Pool

Select the appropriate pool you created above

You must select Advanced from the Configuration list for these options to appear Optional: Only necessary if you are deploying the BIG-IP AAM If you have a large deployment in which you expect more than 64,000 simultaneous connections per server, you must configure a SNAT Pool, with an IP address for each 64,000 simultaneous connections you expect. See the BIG-IP documentation on configuring SNAT Pools.

ch iv ed

3

Protocol Profile (Client)

443 if offloading SSL or SSL Bridging, 80 if not. 1

This completes the BIG-IP configuration.

Next steps

Ar

By completing the configuration in this guide, you have set up multiple WebSEAL servers and made sure they are identical, you have completed the BIG-IP system configuration for load balancing these WebSEAL servers, and you may have added optional SSL offload and acceleration. To ensure that you experience the maximum benefit from your new environment, we recommend the following post-configuration tasks.

Adjust DNS entries in your environment to point to the virtual IP address In this guide you created a front-end IP address on the BIG-IP system; the virtual IP address. You should now adjust all services and users that would have been connecting directly to a WebSEAL server to this virtual address. In typical environment, this means adjusting your DNS entry to point to this virtual server IP address on the BIG-IP system. In some environments, you may be using BIG-IP Global Traffic Manager (GTM) to distribute WebSEAL servers globally at multiple data centers. In this case, you would associate the virtual IP addresses of each WebSEAL environment with BIG-IP GTM. Please see BIG-IP documentation for further information GTM.

Adjust compression and caching settings on WebSEAL If you are using BIG-IP AAM (Application Acceleration Manager) to cache and accelerate WebSEAL server content, you modify the WebSEAL server to further optimize the CPU, memory and disk utilization of the WebSEAL servers. We recommend disabling compression and turning off caching on WebSEAL if you use BIG-IP AAM. Please refer to WebSEAL documentation on making these adjustments.

5

DEPLOYMENT GUIDE IBM Security Access Manager

Adding enhanced monitoring to the implementation In this document, we describe a simple HTTP monitor that tests whether WebSEAL proxy is available. This monitor serves three purposes: • It establishes that an individual WebSEAL server is powered on. • It establishes that the operating system on the WebServer server is able to answer TCP requests, which also means the server has sufficient CPU cycles to allocate user time to the WebSEAL process.  y connecting to the HTTP process, the monitor determines that the actual WebSEAL • B proxy is operational and has the CPU cycles necessary to answer a request.

ch iv ed

We recommended enhancing the monitor by using the Send string and Receive string options to further exercise and test the functionality of the underlying disk subsystem and associated transport systems. In order to modify the monitor, simply open the monitor you created in this guide, and add Send and Receive values. The Send value needs to be properly formatted HTTP and can be anything from: GET / HTTP/1.0\r\n to something more complicated such as GET /mytesturl.html HTTP/1.1\r\nHost: myhostname.local\r\n\r\n . A Receive string is the string you would expect to receive if you executed this query from your browser. It can be something as simple as looking for a word that appears in the response, such as WebSEAL, or it can be a regular expression.

Ar

See the BIG-IP documentation for complete information on configuring advanced monitors.

6

DEPLOYMENT GUIDE IBM Security Access Manager

Troubleshooting Issue: When sending a request through the BIG-IP Virtual Server IP address, the response does not come back, but if sending directly to a WebSEAL server, the response is received. Troubleshooting: In a scenario where responses do not come back when accessing a server through the BIG-IP system, the primary cause is often asymmetric routing. This means that the network connection is taking a different route back to the originating client than the one used to get to the server. This often happens when the servers do not have the BIG-IP system as their default route, which is often the case. If your WebSEAL servers do not have the BIG-IP system as their default route, make sure that you have added a SNAT (either Auto Map or a SNAT Pool) to the virtual server as described in this document.

ch iv ed

Issue: IP Addresses in the WebSEAL logs show the BIG-IP Self IP address instead of the client's actual IP address. Troubleshooting: When servers do not have their default route back to the BIG-IP system, SNAT must be used to avoid asymmetric routing problems which will prevent the delivery of traffic to clients. A side-effect of SNAT is that the originating IP address can be lost. In order to solve this issue, the BIG-IP system inserts an X-Forwarded-For header in the HTTP header and passes this to the server. Follow the configuration steps in this document to use a custom HTTP profile with X-Forwarded-For set to Enabled. Your WebSEAL proxy can be configured to log this X-Forwarded-For header or pass it on to the application server behind it. A second side-effect of using SNAT is that IP Address-based authentication on WebSEAL will not function properly in SNAT environments. IP Address authentication uses the source IP address, which will always be the Self IP address of the BIG-IP system.

Ar

If WebSEAL IP Address based authentication is absolutely required, we recommend the WebSEAL servers be reconfigured to have a default route back to the BIG-IP system. A second option is to move the IP Address authentication to the BIG-IP system itself. This can be achieved through an iRule or through the use of the Application Policy Manager (APM) module. For more information on these options please see BIG-IP documentation or refer to F5's DevCentral site (http://devcentral.f5.com)

7

8 DEPLOYMENT GUIDE IBM Security Access Manager

Document Revision History Version New guide

Date 06-12-2013

Ar

ch iv ed

1.0

Description

F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 F5 Networks, Inc. Corporate Headquarters [email protected]

F5 Networks Asia-Pacific [email protected]

888-882-4447

F5 Networks Ltd. Europe/Middle-East/Africa [email protected]

www.f5.com F5 Networks Japan K.K. [email protected]

©2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, and IT agility. Your way., are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. 1211

Deploying the BIG-IP system with IBM Security Access ... - F5 Networks

Jun 12, 2013 - Archived. DEPLOYMENT GUIDE. IBM Security Access Manager. 3. Configuring the ... Repeat Address and Service Port for all nodes. Optional:.

228KB Sizes 1 Downloads 154 Views

Recommend Documents

Deploying F5 with Microsoft Forefront Unified Access ... - F5 Networks
locations. By using Forefront UAG, you can publish Web and non-Web applications .... It is recommended that for best performance, either. Least Connections ... In the Destination section, select the Host option button. 5. In the Address ... look like

Deploying the BIG-IP System with Microsoft SharePoint - F5 Networks
F5 Analytics (also known as Application Visibility and Reporting or AVR) is a module on the ...... first install and configure the necessary server software for these.

Deploying the BIG-IP System with Microsoft SharePoint - F5 Networks
What type of network connects servers to the BIG-IP system? (on page 13) ..... 1. On the Main tab, expand iApp and then click Application Services. 2. From the list ...

Deploying the BIG-IP System v11 with Microsoft ... - F5 Networks
Aug 2, 2013 - See iPhones and other iOS devices are displaying invalid certificate messages after deploying the iApp for ActiveSync on page 58 for important ...

Deploying the BIG-IP System with Microsoft IIS - F5 Networks
Jun 11, 2013 - Upgrading an Application Service from previous version of the iApp template ..... 1. What type of network connects clients to the BIG-IP system?

Deploying the BIG-IP system v11 with Microsoft ... - F5 Networks
Dec 11, 2012 - The BIG-IP LTM chooses the best available SharePoint device ... 10. SharePoint 2013 server(s) send request to Office Web Apps server(s). .... In the URL protocol, host and port box, change the protocol from http:// to https://.

Deploying the BIG-IP system v11 with Microsoft ... - F5 Networks
Dec 11, 2012 - BIG-IP version 11.0 introduces iApp™ Application templates, ... F5 protects SharePoint deployments that help run your business with powerful.

Deploying the BIG-IP System with Microsoft SharePoint - F5 Networks
Jun 11, 2013 - The BIG-IP LTM chooses the best available SharePoint device ... 10. SharePoint 2013 server(s) send request to Office Web Apps server(s). .... In the URL protocol, host and port box, change the protocol from http:// to https://.

Deploying the BIG-IP System v11 with Microsoft ... - F5 Networks
Aug 2, 2013 - 10. Configuring the BIG-IP iApp for Microsoft Exchange Server 2010 and 2013. 11 ... Access servers: Outlook Web App (which includes the HTTP resources for .... _tcp.example.com: port 443, host 'owa.example.com' ..... Choose the option t

Deploying the BIG-IP System with Microsoft SharePoint - F5 Networks
Jun 11, 2013 - F5 Analytics (also known as Application Visibility and Reporting or AVR) is a ... available from a dashboard-type display, F5 Analytics provides ...

Deploying the BIG-IP System with Microsoft IIS - F5 Networks
Jun 11, 2013 - Visit the Microsoft page of F5's online developer community, DevCentral, ... h If you are using the BIG-IP Application Acceleration Manager (AAM) for ...... To deploy the Custom Logging role service for IIS 8.0 (Windows Server 2012). 1

Deploying the BIG-IP system with Oracle Endeca - F5 Networks
Aug 13, 2013 - h You must have the appropriate DNS and NTP network services .... 1 The LTM HTTP health monitor is specified in the Oracle Endeca ...

Deploying the BIG-IP System for LDAP Traffic ... - F5 Networks
Jun 11, 2013 - f5.ldap iApp template, see Upgrading an Application Service from previous ... This guide is intended to help users deploy web-based applications ..... 10 assign to the pool members. A higher number indicates higher priority. ..... a so

Deploying F5 with SAP NetWeaver Enterprise Portal - F5 Networks
Jun 11, 2013 - applications securely, enjoy operational efficiency and cost control, and remain flexible to ..... previously created to the Application Service.

Deploying F5 with SAP ERP Central Component - F5 Networks
Jun 11, 2013 - 10. SSL Encryption. 12. ASM. 14. Application Firewall Manager (BIG-IP AFM). 14 ... f5.sap_erp iApp template, see Upgrading an Application Service from .... The BIG-IP LTM chooses the best available ECC device based on the load .... Thi

Deploying the BIG-IP System for Diameter Traffic ... - F5 Networks
Jun 11, 2013 - ... Authorization and Accounting (AAA) framework for applications such as ..... For information on certificates on the BIG-IP system, see the online help or the ...... first install and configure the necessary server software for these

Deploying the BIG-IP System for WAN-Optimized ... - F5 Networks
Jun 11, 2013 - 11.4, 11.4.1, 11.5, 11.5.1, 11.6 (BIG-IP AAM must be licensed and provisioned) .... Associated TCP service port (445 is the default for CIFS):.

Deploying the BIG-IP System for RADIUS Traffic ... - F5 Networks
Jun 11, 2013 - This guide is intended to help users deploy web-based applications using the BIG-IP system. ... 10: Network. Where are BIG-IP virtual servers in relation to the servers .... server whose IP address has no bits set in the host portion o

Deploying the BIG-IP System for WAN-Optimized ... - F5 Networks
Jun 11, 2013 - 11.4, 11.4.1, 11.5, 11.5.1, 11.6 (BIG-IP AAM must be licensed and provisioned). FTP .... Associated TCP service port (21 is the default for FTP):.

Deploying F5 with SAP NetWeaver Enterprise Portal - F5 Networks
Jun 11, 2013 - ECC App template. System iApp that ships with v11.4 and later. Deployment Guide version. Last updated. 2.2 (see Document Revision History ...

Deploying F5 with SAP ERP Central Component - F5 Networks
Jun 11, 2013 - F5 Analytics (also known as Application Visibility and Reporting or AVR) is ...... first install and configure the necessary server software for these.

Deploying the BIG-IP System for RADIUS Traffic ... - F5 Networks
Jun 11, 2013 - IP addresses of the RADIUS servers running the Accounting service ...... statistics on the BIG-IP system, see the online help or product documentation. ..... first install and configure the necessary server software for these.

Improving IBM Tivoli Maximo with the F5 BIG-IP System - F5 Networks
goes offline. • Security—The BIG-IP system offers site-to-site encryption for remote offices and SSL termination, offload for all services, and secure remote access.