JAR File Prerequisites

Complete the tasks listed on this page before configuring the connector with .jar files.

  • You must set up a service account that has the required permissions.

  • Ensure that the LDAP directory server associated with IBM Security Verify Access is configured and functional.

  • To support .jar file generation on IBM Security Directory Suite version 10.0, you should use Java version 8.0.7.16-ISS-JAVA-WinX64-FP0016 or later.

Install PDJRTE

Install PDJRTE to configure the IBM Security Verify Access Runtime for Java component which enables the Java application to use Security Verify Access security.

Perform the following steps to install PDJRTE on the LDAP Directory Server Machine:

  1. Copy the license file (PDLIC.txt) from the PDJRTE directory to the root directory (for example, C:\ or / in Unix).

  2. Go to PDJRTE directory through command prompt available on LDAP Directory Server machine.

    For example:

    C:\pdjrte-x.x.x-0\pdjrte\sbin)

    where x.x.x is 9.0.0.

  3. Open Command Prompt and execute the following command:

    • For Windowspdjrtecfg.bat -action config –interactive

    • For UNIXpdjrtecfg -action config -interactive

  4. On the UI dialogue box, configure the java run-time environment for Security Verify Access. Select the valid JRE path and select Next.

  5. Enter the existing policy server information (where your Security Verify Access policy server is running [machine details]) as follows:

    • Host name – IP of the configured IBM Security Verify Access

    • Port – 7135 (Default port)

    • Domain – Default (Recommended)

  6. Enable SVA common directory logging (recommended to keep it on for troubleshooting).

  7. Select Finish.

This adds an additional .jar file in the $JDK_HOME\jre\lib\ext directory which is used by the Security Verify Access Connector. For example:

Copy
PD.jar
ibmjcefips.jar
ibmjcefw.jar
ibmjceprovider.jar
ibmjsseprovider2.jar
ibmpkcs.jar
local_policy.jar
US_export_policy.jar 

Generate config and keyfile

On the LDAP Directory Server host, use the com.tivoli.pd.jcfg.SvrSslCfg command to generate the config and keyfile required to communicate with the IBM Security Verify Access. The file path of the config file must be configured in the application configuration. For example:

>java com.tivoli.pd.jcfg.SvrSslCfg -action config -admin_id sec_master -admin_pwd <password> -appsvr_id server1 -host <host> -port <port_number> -mode remote -policysvr <host:7135:1> -authzsvr <host:7136:2> -domain default -cfg_file <path of config file to be generated> -key_file <Path of key file to generate> -cfg_action create

Where host = the IP address for IBM Security Verify Access.

Integration with IBM Security Verify Access

Perform the following steps to integrate with IBM Security Verify Access.

  1. Copy the following .jar — which are generated from jre/lib/ext file in IBM LDAP Directory Server — to $JDK_HOME\jre\lib\ext or WEB-INF\lib directory on the SailPoint host.

    Copy
    Ibmjcefips.jar
    Ibmjcefw.jar
    Ibmjceprovider.jar
    ibmjsseprovider2.jar
    ibmpkcs.jar
    local_policy.jar
    US_export_policy.jar
    PD.jar
  2. Copy the Policy Director directory from LDAP Directory Server host to the $JAVA_HOME\jre directory on IdentityIQ host.

    Note
    If java installation is not a part of JRE folder then copy the Policy Director directory to $JAVA_HOME.

  3. Copy the config and keystore files from LDAP server machine generated by SvrSslCfg command on IdentityIQ host.

    Note

    Sailpoint recommends that you place the config and keystore files in the root directory. An absolute path of the config file may be referenced and used in the application configuration.

    The config file has an entry which points to the keyfile. As the files are generated on the LDAP Directory Server host and copied to the IdentityIQ server, the keyfile is in a different location. In such scenarios update the config file entry pdcert-url to point to the keyfile.

    For example:

    1. Windowspdcert-url=file\:/C\:/keyfile

    2. Linuxpdcert-url=file\:/usr/TAM/keyfile

  4. Restart the Web Application Server. For example, Tomcat/WebSphere.

Java Authentication and Authorization Service (JAAS)

Security Verify Access Authorization APIs use Java Authentication and Authorization Service (JAAS). To support JAAS, perform the following changes in the java.security file:

  1. Specify the login file location

    Point to the login configuration file from the JAVA_HOME/jre/lib/security/java.security file.

    For example, a sample entry from the java.security file displayed as:

    login.config.url.1=file:${java.home}/lib/security/login.pd

  2. Creating a login configuration file

    Create login.pd on the specified location. If it does not exist, add an entry as follows:

    Copy
    pd {
    com.tivoli.pd.jazn.PDLoginModule required; 
    };