Enabling single sign on for extending services via PassTicket configuration
Enabling single sign on for extending services via PassTicket configuration
One option for enabling single sign on is by configuring Zowe to use PassTickets, whereby API services can authenticate with API Mediation Layer. Follow the procedures described in this article to configure Zowe to use PassTickets, and to enable Zowe to use PassTickets to authenticate towards specific extending services.
- Overview of PassTickets
- Configuring Zowe to use PassTickets
- Adding custom HTTP Auth headers to store user ID and PassTicket
Overview of PassTickets
API clients can use various supported methods to access an API service such as a Zowe JWT token or a client certificate even if the API service itself does not support the JWT token or a client certificate. An intermediary for this support can be through the use of PassTickets.
When an API client provides a valid authentication method to API ML, the API Gateway generates a valid PassTicket for any API service that supports PassTickets. A PassTicket is a one-time only password that is generated for a specific user ID. The API Gateway uses the PassTicket to access that API service. The API Gateway provides the user ID and password in the Authorization header of the HTTP requests using the Basic authentication scheme.
Configuring Zowe to use PassTickets
Configuring Zowe to use PassTickets involves two processes:
- Enabling the use of PassTickets in your External Security Manager (ESM)
- Configuring security to allow the Zowe API Gateway to generate PassTickets for an API service
Enabling the use of PassTickets in your External Security Manager (ESM)
This section applies to users who do not already have PassTickets enabled in the system, or users who need to define a PassTicket for a new APPLID. If you already have an APPLID that you intend to use to define your API service, skip to the section Configuring security to allow the Zowe API Gateway to generate PassTickets for an API service.
To validate if a PassTicket is already defined, use the commands that correspond to your ESM. If the PassTicket is defined, the access of the zoweuser can be determined.
-
Validating an existing PassTicket for ACF2
Click here for details about validating an existing PassTicket for ACF2.
In your ESM command line interface or other security environment, execute the following commands:
SET RESOURCE(SAF)
LIST LIKE(-)
SET RESOURCE(SAF)
LIST LIKE(<applid>-)
SET PROFILE(PTKTDATA) DIVISION(SSIGNON)
LIST LIKE(<applid>-)
SET RESOURCE(PTK)
LIST LIKE(IRRPTAUTH-)-
-
A wildcard symbol that lists all resources -
<applid>-
Lists everything related to specified applid in a resource (in this case, SAF), or specified in a profile (in this case, PTKTDATA)
-
-
Validating an existing PassTicket for Top Secret
Click here for details about validating an existing PassTicket for Top Secret.
In your ESM command line interface or other security environment, execute the following commands:
TSS WHOHAS APPL(<applid>)
TSS WHOHAS PTKTDATA(<applid>)
TSS WHOHAS PTKTDATA(IRRPTAUTH.<applid>.)-
.
A wildcard symbol that lists all resources -
IRRPTAUTH.<applid>.
Returns everything about the specified applid for IRRPTAUTH
-
-
Validating an existing PassTicket for RACF
Click here for details about validating an existing PassTicket for RACF.
In your ESM command line interface or other security environment, execute the following commands:
RLIST APPL * ALL
RLIST APPL <applid> ALL
RLIST PTKTDATA <applid> SSIGNON ALL
RLIST PTKTDATA IRRPTAUTH.<applid>.* ALLEnsure that you validate PKTDATA access for APPL.
-
*
A wildcard symbol that resturns all resources -
RLIST PTKTDATA <applid> SSIGNON ALL
Validates all applid for PTKDATA class -
RLIST PTKTDATA IRRPTAUTH.<applid>.* ALL
Validates all applid permissions for PTKDATA class
-
Follow these steps to enable PassTicket Support specific to your ESM. Consult with your security administrator to perform the following procedures.
Enabling PassTickets with ACF2
Click here for details about configuring Zowe to use PassTickets using ACF2.
- In your ESM command line interface or other security environment, define the application session key by entering the following commands, if the session key is not already defined.
SET PROFILE(PTKTDATA) DIV(SSIGNON)
INSERT <applid> SSKEY(<key-description>) MULT-USE
F ACF2,REBUILD(PTK),CLASS(P)
-
applid
Specifies the application ID used for PassTicket validation to authenticate connections to the server. -
MULT-USE
This setting lets you reuse the same PassTicket multiple times. -
key-description
Specifies the secured sign-on hexadecimal application key of 16 hexadecimal digits (8-byte or 64-bit key). Each application key must be the same on all systems in the configuration and the values must be kept secret and secured.
- Complete the PassTicket setup by entering the following commands:
F ACF2,REBUILD(PTK),CLASS(P)
The PassTicket record is now active in the system.
- Enable the started task user ID to generate PassTickets for the application by entering commands similar to the following:
SET RESOURCE(PTK)
RECKEY IRRPTAUTH ADD(applid.userid UID(<userid>) SERVICE(UPDATE,READ) ALLOW)
<userid>
Specifies the Zowe server user ID
You configured Zowe to use PassTickets using ACF2.
Enabling PassTickets with Top Secret
Click here for details about configuring Zowe to use PassTickets using Top Secret.
Before you begin this procedure, verify that the PTKTDATA
class and ownership for the PassTicket resource (IRRPTAUT
) have not already been defined.
- Update the resource descriptor table (RDT) to define the
PTKTDATA
class by entering the following commands:
The PTKTDATA resource is not a predefined class.
TSS ADDTO(RDT) RESCLASS(PTKTDATA) RESCODE(n) ACLST(ALL,READ,UPDATE) MAXLEN(37)
The PTKTDATA resource is added to the RDT.
Include RESCODE(n)
in the range of 101 to 13F to make PTKTDATA
a prefixed resource class.
- Assign ownership for the PassTicket resource (
IRRPTAUT
). Execute the following commands:
TSS ADDTO(department) PTKTDATA(IRRPTAUT)
- Define PassTicket for application ID applid without replay protection.
TSS ADDTO(NDT) PSTKAPPL(<applid>) SESSKEY(<key-description>) SIGNMULTI
-
applid
Specifies the application ID used for PassTicket validation to authenticate connections to the server. -
key-description
Specifies the secured sign-on hexadecimal application key of 16 hexadecimal digits (8-byte or 64-bit key). Each application key must be the same on all systems in the configuration and the values must be kept secret and secured.
- Permit access to the PassTicket resource defined in the previous step for the LDAP Server by executing the following command:
TSS PERMIT(<stc-userid>) PTKTDATA(IRRPTAUTH.applid) ACCESS(UPDATE)
- stc-userid
Specifies the ACID that you created when you created LDAP Server started task User IDs. The parameter is "CALDAP" by default.
You configured Zowe to use PassTickets using Top Secret.
Enabling PassTickets with RACF
Click here for details about configuring Zowe to use PassTickets using RACF.
- Activate the
PTKTDATA
class, which encompasses all profiles containing PassTicket information.
In your ESM command line interface or other security environment, execute the following command:
SETROPTS CLASSACT(PTKTDATA) RACLIST(PTKTDATA)
- Specify the application ID requiring access through PassTicket for the ZOWE server with the following commands:
RDEFINE APPL <applid> UACC(READ)
SETROPTS CLASSACT(APPL)
SETROPTS GENERIC(PTKTDATA)
- *applid
A one to 8 character name designated for the application.
This name is usually provided by the site security administrator.
- Define the profile for the application with the following command:
RDEFINE PTKTDATA <applid> UACC(NONE) APPLDATA('NO REPLAY PROTECTION') SSIGNON(KEYMASKED(<key-description>) APPLDATA('NO REPLAY PROTECTION')
- key-description
Specifies the secured sign-on hexadecimal application key of 16 hexadecimal digits (8-byte or 64-bit key). Each application key must be the same on all systems in the configuration and the values must be kept secret and secured.
Replace key-description
with the application name defined previously.
PassTickets for the API service must have the replay protection switched off. This links a secured sign-on application key with the application.
- Allow the application ID (applid) to use PassTickets:
PERMIT IRRPTAUTH.applid.* CLASS(PTKTDATA) ACCESS(UPDATE) ID(userid)
- userid
Specifies the value of the LDAP Server started task.
- Refresh the RACF PTKTDATA definition with the new profile:
SETROPTS RACLIST(PTKTDATA) REFRESH
You configured Zowe to use PassTickets using RACF.
Configuring security to allow Zowe API Gateway to generate PassTickets for an API service
As a security administrator, you can issue security commands to allow the Zowe started task user ID to generate PassTickets for the API service.
Specify the following variables when generating PassTickets for the API service to enable the Zowe started task user ID:
-
applid
The APPLID value used by the API service for PassTicket support (e.g.OMVSAPPL
) -
zowe-user-id
The Zowe started task user ID used during the Zowe installation
In the following examples of ESM configuration, replace these variables with actual values.
Use the configuration format that corresponds to your ESM as presented in the following examples.
Generating PassTickets using ACF2
Click here for details about generating PassTickets using ACF2.
Grant the Zowe started task user ID permission to generate PassTickets for users of the API service.
Example:
ACF
SET RESOURCE(PTK)
RECKEY IRRPTAUTH ADD(<applid>.- UID(<zowe-user-id>) SERVICE(UPDATE,READ) ALLOW)
F ACF2,REBUILD(PTK),CLASS(P)
END
Generating PassTickets using Top Secret
Click here for details about generating PassTickets using Top Secret.
Grant the Zowe started task user ID permission to generate PassTickets for users of the API service.
Example:
TSS PERMIT(<zowe-user-id>) PTKTDATA(IRRPTAUTH.<applid>.) ACCESS(READ,UPDATE)
TSS REFRESH
Generating PassTickets using RACF
Click here for details about generating PassTickets using RACF.
Grant the Zowe started task user ID permission to generate PassTickets for users of the API service.
Example:
PERMIT IRRPTAUTH.<applid>.* CL(PTKTDATA) ID(<zowe-user-id>) ACCESS(UPDATE)
SETROPTS RACLIST(PTKTDATA) REFRESH
Validating if the PassTicket Application is created
In your ESM command line interface or other security environment, execute the following commands:
RLIST APPL <applid> ALL
RLIST PTKTDATA IRRPTAUTH.<applid>.* ALL
- applid
The APPLID value used by the API service for PassTicket support
Successful execution of this validation command shows your application and the specific access of the application.
Adding custom HTTP Auth headers to store user ID and PassTicket (Optional)
If a downstream (southbound) service needs to consume the PassTicket and the user ID from custom headers to participate in the Zowe SSO, you can define the custom HTTP headers names as part of the Gateway configuration.
The southbound service must use the httpBasicPassTicket
scheme in order to leverage this functionality. Once the HTTP headers names are defined, each request to the southbound service contains the PassTicket and the user ID in the custom headers.
Use the following procedure to add the custom HTTP headers.
- Open the file
zowe.yaml
. - Find or add the property
components.gateway.apiml.security.auth.passticket.customAuthHeader
and set the value which represents the name of the header. - Find or add the property
components.gateway.apiml.security.auth.passticket.customUserHeader
and set the value which represents the name of the header. - Restart Zowe.
Requests through the Gateway towards the southbound service now contain the custom HTTP headers with the PassTicket and the user ID.