CloudPep

DirX Access Cloud Foundry PEP configuration allows to configure Cloud PEP-specific deployment settings for Cloud PEPs.

Description

Description of the configuration object

Do use SSL/TLS

Whether or not the communication between the client and a DirX Access Services server must be secured using SSL/TLS. The client always tries to establish the SSL/TLS secured connection first. When the secured connection cannot be established, for example, due to missing or wrong client crypto material, and this value is false then the client establishes non-secured connection to the server instead. The configuration parameter 'Do use SSL/TLS' applies to the actual operation phase of a PEP: it means that if SSL/TLS is required but is not available (for some reason), no data will be exchanged. Note that this does not apply to the PEP bootstrap phase, where configuration data is obtained from the server. In this phase, PEPs may silently fall back to plain text communication if no SSL/TLS support is available.

Cache timeout

Clients automatically cache configuration information, increasing system performance. The property determines the length of time in seconds that must elapse before this client refreshes its cache. Note that this setting also influences how quickly the client can learn that a cached object was changed on the server side.

Cluster group

The DirX Access Services cluster group with which the client communicates. By default, cluster group 0 is selected

PEP type (required)

The type of the PEP.

  • Allowed Values:

    • ApacheHttpServer

    • ApacheTomcat

    • Jetty

    • IBMWebSphere

    • MicrosoftIIS

    • MicrosoftIISAgent

    • OracleFusion

    • OracleWebLogic

    • BEAWebLogic

    • RedHatJBOSS

    • SAPNetWeaver

    • ServletApplication

    • CloudFoundry

    • Plain

    • Other

Authority

A symbolic identifier for this PEP used in the normalization of SSO request URIs. Follows the format host:`port`. When processing SSO requests from the PEP, DirX Access replaces the host and port parts in the request URI with the Authority value. Evaluation of authentication and authorization policies is then performed using the normalized request URI.

Session lifetime

The maximum time in seconds since an initial or federated authentication may elapse before the system closes an SSO session created during the authentication.

Session idle timeout

The maximum idle time in seconds since the last processed SSO request that may elapse before the system closes an SSO session created during an initial or federated authentication.

Authentication timeouts extension validity period

Time (in secs) for which user’s request for authentication timeouts extension remains valid; after this timeout, user has to re-request. If 0, user can’t ask for the timeouts extension.The "authentication timeouts extension" capability means that the authentication process run via this PEP will enable the subject being authenticated to extend any authentication-related timeout that is configured server-side. The maximal extension is set at ten-times the corresponding server-side configuration (specific to corresponding authentication method). The goal of this parameter is to comply to the WCAG 2.2 Level AA - Timeouts requirement.

Resource filter

The PEP excludes from processing all SSO requests with the URI containing the path part excluded with one of these exclusions.

Extensions to exclude

The PEP excludes from processing all SSO requests with the URI containing the path part suffixed with one of the extensions.

Resource full paths

The PEP excludes from processing all SSO requests with the URI containing the path part equal one of the full paths.

Resource paths starting with

The PEP excludes from processing all SSO requests with the URI containing the path part prefixed with one of the begin paths.

Resource paths ending with

The PEP excludes from processing all SSO requests with the URI containing the path part suffixed with one of the end paths.

Indeterminate/NotApplicable mapping

Controls the mapping of authorization decision results Indeterminate and NotApplicable.

  • Allowed Values:

    • Permit

    • Deny

Authorization failed URL

The URL for which the authorization failed operation is performed.

Domain name

The domain name within which to authenticate users.

Windows domain controller

The hostname for the Windows domain controller.

Kerberos SPN table identifier

The identifier of the Kerberos SPN table to be used by this PEP.

XACML request construction identifier

The identifier of the XACML request construction template to be used with specified PDP.

PDP identifier

The identifier of the PDP that renders authorization decisions for this PEP.

Request injection template identifiers

The set of all identifiers to the request injection templates to be used with this PEP.

Default authentication method identifier

The identifier of the default authentication method to be used when processing requests based on a distinct PEP configuration object and an authentication method identifier is not present in the request or cannot be determined by means of, for example, an authentication policy.

Allowed authentication method identifiers

The set of all identifiers to represent all allowed authentication methods that can be used with this PEP. The default and RS authentication methods are allowed by default.

Multi-PEP assignments

The list of all multi-PEP assignments for multi-PEP purposes based on this PEP.

Context path

The context path is used to match HTTP servlet request and select appropriate PEP.

Port

The port is used to match HTTP servlet request and select appropriate PEP.

PEP identifier

The identifier of the PEP to be selected when context path match.

Do use internal authorization

Whether the internal authorization is used or permit anything.

Whether or not the PEP should use HTTP session cookies to store and pass DirX Access SSO state. In order to enable DirX Access SSO state cookies, set following fields as well: Cookie name, Cookie domain name (optional), Cookie path for single sign-on (optional), Cookie version (optional), Do require SSL/TLS for cookie transfer (optional) and Set the 'HttpOnly' flag (optional).

The holder holding the PEP cookie configuration

The name of the HTTP cookies used by the PEP to store and pass DirX Access SSO state.

The domain name or IP address of the HTTP cookies, as defined in the RFC 2109, used by the PEP to store and pass DirX Access SSO state. You must set this field correctly, or Web browsers may not send cookies to Web servers as expected. When empty, the PEP set the host part of the SSO request URI as the cookie domain name.

The path of the HTTP cookies used by the PEP to store and pass DirX Access SSO state.

The version of the HTTP cookies used by the PEP to store and pass DirX Access SSO state.

Whether or not the HTTP cookies used by the PEP to store and pass DirX Access SSO state use the secure flag. The secure flag is an option that can be set when sending a cookie to the browser within an HTTP response. The purpose of the secure flag is to prevent cookies from being observed by unauthorized parties due to the transmission of the cookie in clear text. To accomplish this goal, browsers that support the secure flag will only send cookies with the secure flag when the request is going to an HTTPS page. Setting the secure flag prevents the browser from transmitting the DirX Access SSO state over an unencrypted channel.

Do set the 'HttpOnly' flag

Whether or not the HttpOnly flag should be set to the HTTP cookies used by the PEP to store and pass DirX Access SSO state.

If true the cookie is declared as persistent HTTP cookie with max-age set to session idle timeout, otherwise the cookie is declared as a session cookie (has max-age equal to -1).

'SameSite' flag

The 'SameSite' flag of the HTTP cookies used by the PEP as described on https://datatracker.ietf.org/doc/html/draft-west-first-party-cookies-07 page.

  • Allowed Values:

    • NotIncluded

    • None

    • Lax

    • Strict

Do enable URL rewriting

Whether or not URL rewriting is enabled. URL rewriting (referring to Web application environments) can be used as an alternative to HTTP cookie headers to maintain DirX Access session state. The full URL rewriting feature can be used with dynamic Web resources and is currently limited to Java PEPs (working with 'HttpServletRequest' abstractions). The URL rewriting feature in C PEPs is limited to providing DirX Access session state to backend applications via HTTP header injection and to encoding it into a redirection URL (HTTP header Location in HTTP 302 responses). To enable URL rewriting, set the URL rewriting field name (optional) in addition to this field.

URL rewriting field name

The name of HTTP URL query parameter used by the PEP to store and pass DirX Access SSO state. When empty, then the Cookie name property value is used instead.

Do enable Form authentication

Whether or not the PEP should recognize SSO requests with URI equal to the 'Authentication form action' field value as form-based authentication requests. To enable form-based authentication for the PEP, set the 'Authentication form action', 'Loginname field name', 'Password field name' and 'Form authentication target URL field name' fields as well.

Form authentication action URI

The URI path that represents form-based authentication endpoint. When form-based authentication is enabled and the SSO request URI is equal to the 'Authentication form action URI', then the PEP gets credentials and a target URL from the request parameters and performs the authentication.

Form authentication loginname field name

The name of an HTTP request parameter from which the PEP gets the login name for the form-based authentication.

Form authentication password field name

The name of an HTTP request parameter from which the PEP gets the password for the form-based authentication.

Form authentication target URL field name

The name of an HTTP request parameter from which the PEP gets the target URL for the form-based authentication. On successful authentication the PEP makes a redirection to the target URL.

Logout action URI

The URI for which the logout operation is performed.

Logout Target URL field name

The field name within the specified logout operation that specifies the URL of the target resource to present on logout.

Do enable cache control

Controls the setting of the "do not cache" header property by the PEP.

PEP custom data

The holder holding the PEP custom data. Custom data consists of a pool of information that originates from an actual request and its parts, such as HTTP headers, cookie headers, session attributes, and request parameters and attributes. This pool of information can be associated with the SSO state of an authenticated subject and can be used in subsequent processing such as authorization decision-making or SAML assertion issuance.

Do process HTTP headers to extract custom data

Whether or not the PEP should process HTTP headers to extract custom data. Custom data consists of a pool of information that originates from an actual request and its parts, such as HTTP headers, cookie headers, session attributes, and request parameters and attributes. This pool of information can be associated with the SSO state of an authenticated subject and can be used in subsequent processing such as authorization decision-making or SAML assertion issuance.

Do process HTTP cookies to extract custom data

Whether or not the PEP should process HTTP cookies to extract custom data.

Do process HTTP session attributes to extract custom data

Whether or not the PEP should process HTTP session attributes to extract custom data.

Do process HTTP request parameters to extract custom data

Whether or not the PEP should process HTTP request parameters to extract custom data.

Do process HTTP request attributes to extract custom data

Whether or not the PEP should process HTTP request attributes (see the Servlet API description for HttpServletRequest.getAttribute() interface) to extract custom data.

Maximum length of custom data

The maximum length of each custom data item, for example, one HTTP request parameter or header. Custom data items longer than this limit are truncated. There is no limit for the overall size of custom data, which might lead to performance issues, when too much custom data is configured.

OAuth RS authentication method identifier

The identifier of the authentication method to be used for resolution of the OAuth token, if the PEP shall represent the OAuth Resource Server. If null, the OAuth Resource Server is not supported. If non-null, the processing of each request at this PEP is subject to the configuration of given authentication method.

Authentication application URI

The location of the authentication application to be used for authentication (creation of DirX Access SSO state) in case there is no Cookie found or DirX Access SSO state is not valid. At least "Enable URL rewriting" and "URL rewriting field name" must be set in case authentication application residing in different domain than a Cloud PEP. Authentication application can now issue a cookie into request parameter with "URL rewriting field name".

Do enable session in query parameters

Whether or not DirX Access SSO state should be seeked also in query parameters. The control is connected with 'Enable URL rewriting' and 'URL rewriting field name'. Transmitting DirX Access SSO state is more secure in HTTP POST body parameters. The value must be set in case DirX Access SSO state must be transmitted in HTTP GET query parameters.