1 IBM Security Systems Access Management October, 2014 IBM SECURITY ACCESS MANAGER MOBILE DEMONSTRATION COOKBOOK BASED ON FIRMWARE Version 2.5 Patrick...
1 IBM SECURITY ACCESS MANAGER Federation Cookbook Installation, SAML 2.0, OpenID Connect, and Secure Token Service Jon Harry Pranam Codur Sumana Naras...
1 IBM SECURITY ACCESS MANAGER Virtual Machine Cookbook Configuring an ISAM VM for basic tasks Scott M Andrews Version October 20172 Table of Contents ...
1 IBM SECURITY ACCESS MANAGER Federation Cookbook Installation, SAML 2.0, OpenID Connect, and Secure Token Service Jon Harry Pranam Codur Sumana Naras...
1 IBM Security Access Manager Version May 2017 Product overview IBM2 3 IBM Security Access Manager Version May 2017 Product overview IBM4 ii IBM Secur...
1 IBM Security Access Manager Version December 2017 Error Message Reference IBM2 3 IBM Security Access Manager Version December 2017 Error Message Ref...
1 IBM Security Access Manager Version 9.0 October 2015 Development topics IBM2 3 IBM Security Access Manager Version 9.0 October 2015 Development topi...
1 IBM Security Access Manager Version December 2017 Troubleshooting Topics IBM2 3 IBM Security Access Manager Version December 2017 Troubleshooting To...
1 IBM Security Access Manager Version December 2017 Product overview IBM2 3 IBM Security Access Manager Version December 2017 Product overview IBM4 ii...
1 IBM Security Access Manager Version 9.0 October 2015 Product overview IBM2 3 IBM Security Access Manager Version 9.0 October 2015 Product overview I...
1 IBM Security Access Manager Version November 2018 Product overview IBM2 3 IBM Security Access Manager Version November 2018 Product overview IBM4 ii...
IBM Security Systems Access Management October, 2014
IBM SECURITY ACCESS M ANAGER M OBILE DEMONSTRATION COOKBOOK BASED ON FIRMWARE 8.0.0.5 Version 2.5 Patrick Wardrop Andy Ybarra Matthew Duggan
IBM Security Access Manager for Mobile Demonstration Cookbook Page |2
Table of Contents Introduction to the IBM Security Access Manager Appliance architecture ............................................................................. 6 Initial Appliance Configuration................................................................................................................................................. 7 1.1
Create the VMWare Virtual Machine ........................................................................................................................ 7
Step 1: Select “Create a New Virtual Machine” ............................................................................................................... 7 Step 2: Select the “Custom” radio button, select “Next” .................................................................................................. 7 Step 3: Select “Next” ........................................................................................................................................................ 8 Step 4: Specify the location of the ISAM Virtual Image ISO file, Select “Next” ............................................................... 9 Step 5: Select “Next” ........................................................................................................................................................ 9 Step 6: Update the “Virtual machine name” and “Location” if desired, Select “Next” .................................................... 10 Step 7: Select “Next” ...................................................................................................................................................... 10 Step 8: Increase memory to “2048”, Select “Next” ........................................................................................................ 11 Step 9: Select “Next” ...................................................................................................................................................... 11 Step 10: Select “Next” .................................................................................................................................................... 12 Step 11: Select “Next” .................................................................................................................................................... 12 Step 12: Select “Next” .................................................................................................................................................... 13 Step 13: Set “Maximum disk size” to “20” GB, and Select the “Split virtual disk into multiple files” radio button .......... 13 Step 14: Select “Next” .................................................................................................................................................... 14 Step 15: Select “Customize Hardware” to add 2 more Network Adapters. ................................................................... 14 Step 16: Select “Network Adapter NAT” then select “Add” ............................................................................................ 15 Step 17: Select “Network Adapter”, Select “Next” ......................................................................................................... 15 Step 18: Select “Finish” .................................................................................................................................................. 16 Step 19: Repeat steps 16-18 to add a third Network Adapter. Once done the “Hardware” tab should show 3 Network Adapters as shown below. Then select “Close” ............................................................................................................ 16 Step 20: Select “Finish” .................................................................................................................................................. 17 Step 21: Select “Power on this virtual image” ................................................................................................................ 17 1.3
Install the Firmware ................................................................................................................................................ 18
IBM Security Access Manager for Mobile Demonstration Cookbook Page |3
Step 1: Press .................................................................................................................................................... 18 Step 2: Select your language and press .......................................................................................................... 18 Step 3: Type “yes” and press ........................................................................................................................... 18 Step 5: Unmount install image, Select VM Settings .................................................................................................. 19 Step 5: Unmount install image, Highlight “CD/DVD” and uncheck “Connected” and “Connect at power on”, and select “OK”................................................................................................................................................................................ 20 Step 6: Select “Yes” ....................................................................................................................................................... 20 Step 7 Return to the VMWare console and press ........................................................................................... 21 1.4
Configure the Appliance ......................................................................................................................................... 21
Step 1: Login using username:”admin” password:”admin” ............................................................................................ 21 Step 2: Press .................................................................................................................................................... 21 Step 3: type “4” and press ................................................................................................................................ 21 Step 4: type “1” and press ................................................................................................................................ 21 Step 5: Type “n” and press .............................................................................................................................. 22 Step 6: Type “n” and press .............................................................................................................................. 22 Step 7: Type “1” and press .............................................................................................................................. 22 Step 8: Enter a hostname (i.e. “isam8”) and press .......................................................................................... 23 Step 9: type “n” and press ................................................................................................................................ 23 Step 10: Type “3” to configure the management interface, and press ............................................................ 23 Step 11: Type “2” to manually enter the parameters, and press ..................................................................... 23 Step 12: Make sure the network settings are correct for the Virtual Network assigned to the VM ............................... 23 Step 13: Type “1” to automatically configure the IPV6 settings, and press ..................................................... 24 Step 14: Type “n”, and press ........................................................................................................................... 24 Step 15: Type “n” and press ............................................................................................................................ 24 Step 16: Type 1,2,3 to set the time, date, and timezone. Once done accepts the changes and type “n” and press .......................................................................................................................................................................... 24 Step 17: Type “1” to accept the configuration, and press ................................................................................ 25 Configure the ISAM for Mobile Demo ................................................................................................................................... 25 1.0
Prepare the demo config rest client ........................................................................................................................ 25
IBM Security Access Manager for Mobile Demonstration Cookbook Page |4
Extract the “com.ibm.security.access.mobile.demo.rest.client.zip” file to your local system ........................................ 25 Edit the “settings.json” file for Your Environment .......................................................................................................... 25 1.1
Execute the Demo Config Tool ............................................................................................................................... 26
Change into the directory where the “com.ibm.security.access.mobile.demo.rest.client.jar” file is and execute the program .......................................................................................................................................................................... 26 The script will run for a number of minutes and then pause .......................................................................................... 26 1.2
Run the ISAM Config Tool ...................................................................................................................................... 26
Go to the VMWare console and execute the “config” tool ............................................................................................. 26 Interact with the ISAM Config tool as shown below ....................................................................................................... 26 1.3
Complete Executing the Demo Config Tool ........................................................................................................... 30
Return to the cmd shell in which the demo config tool is paused and Press to continue running the tool ...... 30 When the Demo Config Tool is Complete it will Return ................................................................................................. 30 1.4
Final Configuration for the Mobile Demo ................................................................................................................ 30
From a Web Browser Login to the Admin Interface as the admin User ........................................................................ 30 Upload the Mobile Demo HTML Files (“default_root_wga_templates.zip”) ................................................................... 30 Set Demo Configuration Parameters ............................................................................................................................. 31 Set the Final Demo Configuration Parameters (Only required once) and select “Save” ............................................... 32 Scenario 1: Step-up authentication if device is not registered .............................................................................................. 33 Scenario 1: Testing ............................................................................................................................................................... 33 Register HOTP for “testuser” ......................................................................................................................................... 33 Use Google Authenticator and register the one-time-password by either entering the initialization key or scanning the QRCode ......................................................................................................................................................................... 33 Select “Home” from the menu and then select “Risk-based Access Scenario” ............................................................. 34 Enter your HOTP one-time password and select verify ................................................................................................. 34 If you see the screen below the Mobile Demo is Working!! ........................................................................................... 35 Scenario 2: Step-up authentication based on transaction context FORM Parameter example ........................................... 37 Scenario 2: Testing ............................................................................................................................................................... 37 Scenario 3: Payload Extraction using Mobile Application JSON .......................................................................................... 39 Scenario 3: Testing ............................................................................................................................................................... 39
IBM Security Access Manager for Mobile Demonstration Cookbook Page |5
Activate IBM Security Access Manager product capabilities .................................................................................. 49
1.8
Configuring the Web Reverse Proxy ...................................................................................................................... 50
1.9 Configuring the web reverse proxy to point at the IBM Security Access Manager for Mobile Authorization Decision Point ................................................................................................................................................................... 56 Mobile Demo Scenarios Manual Setup ................................................................................................................................. 62 Scenario 1: Step-up authentication if device is not registered .............................................................................................. 62 Scenario 1: Setup .......................................................................................................................................................... 62 Scenario 2: Step-up authentication based on transaction context FORM Parameter example ........................................... 68 Scenario 2: Setup .............................................................................................................................................................. 68 Scenario 3: Payload Extraction using Mobile Application JSON .......................................................................................... 76 Scenario 3: Setup .............................................................................................................................................................. 76 Scenario 4: Hijack Session Protection Scenario ................................................................................................................... 81 Scenario 4: Setup .............................................................................................................................................................. 81 Scenario 5: Trusteer Secure Mobile Browser ....................................................................................................................... 86 Scenario 5: Setup .............................................................................................................................................................. 86 Scenario 6: Oauth 2.0 ........................................................................................................................................................... 91 Scenario 6: Setup .............................................................................................................................................................. 91 Notices .................................................................................................................................................................................. 96
IBM Security Access Manager for Mobile Demonstration Cookbook Page |6
IBM Security Access Manager Mobile Demo Cookbook Introduction to the IBM Security Access Manager Appliance architecture The IBM Security Access Manager Appliance includes a single ISO image which incorporates: 1. IBM Security Access Manager for Mobile (ISAM4M), providing advanced authentication and authorization capabilities. 2. IBM Security Access Manager for Web (ISAM4W), which provides web reverse proxy capabilities and also can act as an enforcement point for IBM Security Access Manager for Mobile.
192.168.116.110 192.168.116.120
Note: This document outlines the steps for setting up the mobile demo on an “All-In-One” Appliance.
IBM Security Access Manager for Mobile Demonstration Cookbook Page |7
Initial Appliance Configuration 1.1
Operating Environment The Virtual Appliance VMWare Image is a 64bit image and it must run on a host machine that can run 64bit (64bit processor). For production use, the VirtualAppliance VMWare Image requires VMWare ESX/ESXi version 5.0 or newer. For the beta, you can run it on the following VMWare products but this is not officially supported. VMWare Workstation 7.15 or newer VMWare Player version 6.0 or newer
1.2
Create the VMWare Virtual Machine Step 1: Select “Create a New Virtual Machine”
Step 2: Select the “Custom” radio button, select “Next”
IBM Security Access Manager for Mobile Demonstration Cookbook Page |8
Step 3: Select “Next”
IBM Security Access Manager for Mobile Demonstration Cookbook Page |9
Step 4: Specify the location of the ISAM Virtual Image ISO file, Select “Next”
Step 5: Select “Next”
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 10
Step 6: Update the “Virtual machine name” and “Location” if desired, Select “Next”
Step 7: Select “Next”
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 11
Step 8: Increase memory to “2048”, Select “Next”
Step 9: Select “Next”
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 12
Step 10: Select “Next”
Step 11: Select “Next”
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 13
Step 12: Select “Next”
Step 13: Set “Maximum disk size” to “20” GB, and Select the “Split virtual disk into multiple files” radio button
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 14
Step 14: Select “Next”
Step 15: Select “Customize Hardware” to add 2 more Network Adapters.
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 15
Step 16: Select “Network Adapter NAT” then select “Add”
Step 17: Select “Network Adapter”, Select “Next”
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 16
Step 18: Select “Finish”
Step 19: Repeat steps 16-18 to add a third Network Adapter. Once done the “Hardware” tab should show 3 Network Adapters as shown below. Then select “Close”
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 17
Step 20: Select “Finish”
Step 21: Select “Power on this virtual image”
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 18
1.3
Install the Firmware Step 1: Press
Step 2: Select your language and press
Step 3: Type “yes” and press
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 19
Step 5: Unmount install image, Select VM Settings
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 20
Step 5: Unmount install image, Highlight “CD/DVD” and uncheck “Connected” and “Connect at power on”, and select “OK”
Step 6: Select “Yes”
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 21
Step 7 Return to the VMWare console and press
1.4
Configure the Appliance Step 1: Login using username:”admin” password:”admin”
Step 2: Press
Step 3: type “4” and press
Step 4: type “1” and press
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 22
Step 5: Type “n” and press
Step 6: Type “n” and press
Step 7: Type “1” and press
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 23
Step 8: Enter a hostname (i.e. “isam8”) and press
Step 9: type “n” and press
Step 10: Type “3” to configure the management interface, and press
Step 11: Type “2” to manually enter the parameters, and press
Step 12: Make sure the network settings are correct for the Virtual Network assigned to the VM
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 24
Step 13: Type “1” to automatically configure the IPV6 settings, and press
Step 14: Type “n”, and press
Step 15: Type “n” and press
Step 16: Type 1,2,3 to set the time, date, and timezone. Once done accepts the changes and type “n” and press
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 25
Step 17: Type “1” to accept the configuration, and press
Configure the ISAM for Mobile Demo 1.0
Prepare the demo config rest client Extract the “com.ibm.security.access.mobile.demo.rest.client.zip” file to your local system
Edit the “settings.json” file for Your Environment
Highlighted lines need to be updated. See “README.txt” for additional details on parameters and instructions.
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 26
1.1
Execute the Demo Config Tool Change into the directory where the “com.ibm.security.access.mobile.demo.rest.client.jar” file is and execute the program
The script will run for a number of minutes and then pause
1.2
Run the ISAM Config Tool Go to the VMWare console and execute the “config” tool
Login with username “admin”, password “admin Type “isam”, and press Type “mga, and press Type “config” and press
Interact with the ISAM Config tool as shown below Select/deselect the capabilities you would like to configure by typing its number. Press enter to continue: [ X ] 1. Context-based Authorization [ X ] 2. Authentication Service [ X ] 3. API Protection Enter your choice: Press 1 for Next, 2 for Previous, 3 to Repeat, C to Cancel: 1 Security Access Manager for Mobile Local Management Interface hostname: 192.168.116.120 Security Access Manager for Mobile Local Management Interface port [443]: 443 Security Access Manager for Mobile Appliance administrator user ID [admin]: admin Security Access Manager for Mobile Appliance administrator password:
IBM Security Access Manager for Mobile Demonstration Cookbook P a g e | 27
Testing connection to https://192.168.116.120:443/. SSL certificate information: Issuer DN: CN=isam4m Subject DN: CN=isam4m SSL certificate fingerprints: MD5: 7A:93:EB:F4:65:EA:F3:A2:10:37:CD:88:C3:52:FC:3D SHA1: 2A:A2:29:DB:E9:38:C5:0E:ED:27:35:95:0E:F1:B3:06:C6:E2:0D:E9 SSL certificate data valid (y/n): y Press 1 for Next, 2 for Previous, 3 to Repeat, C to Cancel: 1 Web Gateway Appliance Local Management Interface hostname: 192.168.116.120 Web Gateway Appliance Local Management Interface port [443]: 443 Web Gateway Appliance administrator user ID [admin]: admin Web Gateway Appliance administrator password: admin Testing connection to https://192.168.116.120:443/. SSL certificate information: Issuer DN: CN=isam4w Subject DN: CN=isam4w SSL certificate fingerprints: MD5: 7E:88:5C:FA:F6:E3:5C:12:D5:72:64:EF:F3:4C:AA:83 SHA1: BB:EA:97:55:25:DC:67:64:01:35:79:F7:E6:27:E0:97:90:A9:1A:84 SSL certificate data valid (y/n): y Instance to configure: 1. default 2. Cancel Enter your choice [1]: 1