This can all be very confusing, and it took me a while to get past the things that looked like obstacles at first.

Windows authenticates - in a Kerberos environment, the iSeries recognizes that authentication, so passwords for the iSeries are not stored anywhere - you actually don't even NEED them, for the day-to-day user.

In Kerberos environments that don't use EIM, the user names have to be the same on both Windows and the iSeries, or any app on the iSeries that login, such as our WebDocs product.

Therefore, EIM comes in to map the identifier used in Windows domain to the identifier used on the iSeries (the user profile). This makes it really nice to retrofit, say, Kerberos and SSO in a place where the names are different, like maybe there didn't used to be a Windows domain.

Kerberos is a 3rd-party authentication model - the KDC authenticates both a user and an application or system. It gives a ticket to a user when that user tries to use or connect to something - that ticket lets the user know that the system or app is friendly.

It's like the old speak-easy days - you go up to the door and knock, a little window opens up, and Bruno says, "Who do you think YOU are?" But you know a guy named Joe, who said that Bruno also knows Joe, so you say, "Joe sent me" and show Bruno Joe's card (ticket). Then Bruno says, "OK, come on in - since Joe says you're OK."

Now maybe the speak-easy used to have a list of people who knew the secret rat-a-tat-tat, but with Joe, they don't need that anymore, nor do you have to know that secret handshake or whatever.

I think you've actually made it much harder than it is. I mean, you still need a user profile on the iSeries, for authorization - what you are allowed to do. SSO separates authentication (who you are) and authorization (what your privileges are) in the login process.

Now you don't really need to use the Windows AD - you could use the LDAP server on the iSeries. But things just get a little messier, seems to me.

There ARE also APIs for EIM that can be used in Windows apps - but that won't help, cuz you're not asking a Windows app to recognize your authentication from Windows.

Have you seen the SSO 101 article on Developeworks? Try it at http://www.ibm.com/developerworks/ibmi - somewhere on that page is a link - it was written by the ISV support team in Rochester, who were invaluable in helping me enable our product for SSO.

HTH
Vern

On 9/12/2012 2:59 PM, Jack Kingsley wrote:
Have some questions on this:

A) If windows AD owns the KDC, shouldn't it own the EIM/SSO as well.
B) I want to get to the point of using all of this, but unfortunately I am
in a situation where the 'I' would not be the server owner per-se.
C) I want to run a 5250 session using KEREBEROS, but I want the ISERIES
profiles/passwords to be coming from the AD side, can't this come from the
AD side so long as I just add the ISERIES to the AD realm??

In what I want to do I want my environment to be more of the slave to these
and not the host/owner of it.

Should I be leveraging LDAP to some extent as well with all of this.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.