©Copyright International Business Machines Corporation 2008, 2012. All rights reserved. U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
NOTE: Before using this information and the product it supports, read the general information under the Notices section of this document.
Date: Tuesday, 03 July 2012
This fix pack corrects problems in IBM Tivoli Federated Identity Manager (Federated Identity Manager) and IBM Tivoli Federated Identity Manager Business Gateway (Federated Identity Manager Business Gateway), Version 6.2.2. It requires that Federated Identity Manager or Federated Identity Manager Business Gateway, Version 6.2.2, be installed. After installing this fix pack, your Federated Identity Manager or Federated Identity Manager Business Gateway installation will be at level 6.2.2.2.
Possible security exposure with IBM WebSphere Application Server with WS-Security enabled applications using LTPA tokens (CVE-2011-1377)
The security that the IBM WebSphere Application Server provides might be weaker than expected when using web services security (WS-Security). A user might randomly gain elevated privileges on the provider system. WS-Security might assign the identity of a previously processed LTPA token to a new inbound LTPA token after authentication. This impacts applications using either JAX-WS and JAX-RPC.
Versions affected:
The same fix applies to the IBM WebSphere Application Server Standalone, Network Deployment and Embedded (eWAS) versions. It also applies to the eWAS version that is included with IBM Tivoli Federated Identity Manager. For more information regarding the vulnerability and the fix, access http://www.ibm.com/support/docview.wss?uid=swg21587536
Use the IBM WebSphere Update Installer (WUI) to apply the fix. If the WUI has not been previously installed, the WUI can be downloaded from http://www.ibm.com/support/docview.wss?rs=180&uid=swg24020448. For detailed instructions on how to install the IBM WebSphere Update Installer, see the WebSphere Update Installer documentation.
Apply the fix provided here to all Tivoli Federated Identity Manager environments that use the affected versions of IBM WebSphere Application Server as soon as possible. Select the fix that applies to your IBM WebSphere Application Server environment and reference the corresponding readme file for detailed fix installation instructions.
Denial of Service Security Exposure with Java JRE/JDK hanging when converting 2.2250738585072012e-308 number (CVE-2010-4476)
This security alert addresses a serious security issue: CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, go into an infinite loop, and/or crash resulting in a denial of service exposure. The JRE might hang if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.
The following products contain affected versions of the Java Runtime Environment:
The same iFix applies to the IBM WebSphere Application Server Standalone, Network Deployment and Embedded (eWAS) versions. It also applies to the eWAS version that is included with IBM Tivoli Federated Identity Manager. For more information regarding the vulnerability and the iFix access http://www.ibm.com/support/docview.wss?uid=swg21462019
Use the IBM WebSphere Update Installer (WUI) to apply the fix. If the WUI has not been previously installed, the WUI can be downloaded from http://www.ibm.com/support/docview.wss?rs=180&uid=swg24020448. For detailed instructions on how to install the IBM WebSphere Update Installer, see the WebSphere Update Installer documentation.
Apply the fix provided here to all Tivoli Federated Identity Manager environments that use the affected versions of IBM WebSphere Application Server as soon as possible. Select the fix that applies to your IBM WebSphere Application Server environment and reference the corresponding readme file for detailed iFix installation instructions.
JAVA.LANG.RUNTIMEEXCEPTION: SRV.8.2: REQUESTWRAPPER OBJECTS MUST EXTEND SERVLETREQUESTWRAPPER OR HTTPSERVLETREQUESTWRAPPER (PM10357)
This APAR PM10357 is reported for WebSphere Application Server (WAS) v6.1. As a result of this APAR, operations in the IBM Tivoli Federated Identity Manager Management Console can fail with the following exception observed in the log if the Management Console is deployed on an affected version of WAS v6.1:
java.lang.RuntimeException: SRV.8.2: RequestWrapper objects must extend ServletRequestWrapper or HttpServletRequestWrapper
Apply the fix provided here to all Tivoli Federated Identity Manager environments that use the affected versions of IBM WebSphere Application Server. Select the fix that applies to your IBM WebSphere Application Server environment and reference the corresponding readme file for detailed iFix installation instructions.
The same fix applies to the IBM WebSphere Application Server Standalone, Network Deployment and Embedded (eWAS) versions. It also applies to the eWAS version that is included with IBM Tivoli Federated Identity Manager.
The IBM WebSphere Update Installer (WUI) must be used to apply the fix. If the WUI has not previously installed, download the WUI from http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg24020448. For detailed instructions on how to install the IBM WebSphere Update Installer access here.
This fix pack package contains:
This fix pack is distributed as an electronic download from the IBM Support Web Site.
This fix pack package supports the same operating system releases that are listed in the Hardware and software requirements topic for Federated Identity Manager Version 6.2.2.
Federated Identity Manager consists of the following components that can be installed separately:
This fix pack applies only to the administration console, management service and runtime component, and Web Services Security Management (first three components listed above) and the Web plug-in (Internet information services, Apache/IBM HTTP Server Web plug-in) components. These components must be at the same level. For example, if you install a fix pack for the management service and runtime component, you must install the corresponding fix packs for the administration console and WSSM components. If all three components are not at the same fix pack level, they are not guaranteed to interoperate with each other as designed.
The following problems are corrected by this fix pack. For more information about the APARs listed here, see the Tivoli Federated Identity Manager support site.
Be aware of the following considerations before installing this fix pack:
Tivoli Federated Identity Manager is a 32-bit application. Therefore, its default path when installing on Windows Server 2008 changes from
C:\Program Files\IBM\FIM
to:
C:\Program Files (x86)\IBM\FIM
NOTE: Changing the installation path name affects a 32-bit WebSphere Application Server on Windows Server 2008.
C:\Program Files\IBM\WebSphere
changes to:
C:\Program Files (x86)\IBM\WebSphere
The runtime and management service component requires WebSphere® Application Server to be installed. The following list provides descriptions for various versions of WebSphere Application Server that are compatible with Tivoli® Federated Identity Manager, version 6.2.2.
Install one of the following versions of WebSphere Application Server:
NOTE: If you use WebSphere Application Server fixpack 29 or fix pack 31, you must also apply the fix for the WebSphere Application Server APAR PM10357.
C:\Program
Files\IBM\WebSphere\UpdateInstaller\maintenance
for Windows or
/opt/IBM/WebSphere/UpdateInstaller/maintenance
for Unix/Linux
Unzip the downloaded file before you apply the patch. The unzipped contents comprise of one or more pak files. Each pak file corresponds to one or more product components. For example, a fix pack might contain two pak files: one for the administration console and management service and runtime components, and one for the WSSM component. The list of product components is included in Fix pack structure.Use the IBM WebSphere Update Installer to apply the fixes of each pak
file to the target component on the system that you are updating. Apply
all of the pak files that your installation requires to ensure that
the software levels in your environment are identical for all of the
components for which a pak file is supplied. The fixes are tested
against all affected components. To minimize any possible issue that
can arise from applying a partial fix, ensure the you apply the
complete set of files. See
NOTE: Before installing this fix pack, ensure that you have reviewed the prerequisites in Before installing the fix pack.
To obtain the fix pack:
NOTE: The information provided below is only required for instances where the WebSphere Application Server administrator credentials have been changed since Tivoli Federated Identity Manager was installed. The WebSphere Application Server administrator credentials are retained by the installer so that Federation First Steps works immediately after installation.
If security is enabled on the WebSphere Application Server where
Federated Identity Manager is installed, set the appropriate password
values in the fim.appservers.properties
file before you can
apply the fix pack.
If security is not enabled, you can skip this step.
NOTE: If you add passwords to the fim.appservers.properties
file, as described below, specify the passwords using plain text.
However, at the end of the fix pack installation process the
passwords are obfuscated and are no longer be available in plain text
format.
To specify security passwords, use the following procedure:
FIM_INSTALL_DIR/etc/fim.appservers.properties
.was.security.enabled
property is present
in the fim.appservers.properties
file and is set to true
then you must add two password properties to the file:
was.admin.user.pwd
property with a value
of the administrator login password for the WebSphere Application
Server where Federated Identity Management is deployedwas.truststore.pwd
property with a value
of the password for the trust store used for client-side SSL
authentication in that WebSphere Application Serverwas.admin.user.pwd=was_admin_pw
was.truststore.pwd=truststore_pw
ewas.security.enabled
property is
present in the fim.appservers.properties
file and is set
to true
then you must add two password properties to the
file:
ewas.admin.user.pwd
property with a
value of the administrator login password for the Embedded
WebSphere Application Server where Federated Identity Management
is deployedewas.truststore.pwd
property with a
value of the password for the trust store used for client-side SSL
authentication in that Embedded WebSphere Application Serverewas.admin.user.pwd=ewas_admin_pw
ewas.truststore.pwd=truststore_pw
fim.appservers.properties
fileC:\Program
Files\IBM\WebSphere\UpdateInstaller\maintenance
for Windows, or
/opt/IBM/WebSphere/UpdateInstaller/maintenance
for Unix/Linux.
C:\Program
Files\IBM\WebSphere\UpdateInstaller
on Windows systems, or in /opt/IBM/WebSphere/UpdateInstaller
on UNIX-based systems).C:\Program Files\IBM\FIM
on
Windows systems, or /opt/IBM/FIM
on UNIX-based systems),
then click Next.FIM_INSTALL_DIR/etc/version.propeties
file with a text editor. The following list describes how to
interpret the properties in the version.properties
file:
itfim.build.version.rte-mgmtsvcs=version
itfim.build.version.mgmtcon=version
itfim.build.version.wsprov=version
itfim.build.version.wssm=version
itfim.build.version.fimpi=version
Apply the fix packs to the product's components in the following order:
NOTE: If a domain is not created before application of Tivoli Federated Identity Manager fix pack, the fix pack installation completes successfully with a "Partially Successful" message.
NOTE: The IBM WebSphere Update Installer allows you to select more than one pak file at a time for execution. Select only the pak files that correspond to the components that are installed on the system you are updating. If you accidentally install more pak files than are needed, you can separately uninstall any fix packs for components that are not installed on the target system.
NOTE: If you are using the Kerberos Delegation STS module, you need to do the following to ensure the Kerberos Delegation DLL is not loaded in the Java Virtual Machine when it is replaced during runtime component deployment:
After you install the fix pack, redeploy the Tivoli Federated Identity Manager runtime. This task is identical to the deployment task you completed after the initial installation of the management service and runtime components. In a WebSphere cluster environment, you must ensure that the new runtime component is deployed to each WebSphere node.
The initial deployment steps are described in Creating and deploying a new domain in the Configuring Guide. The specific instructions for deploying the runtime begin in step 16.
NOTES:
Use the following procedure to deploy the updated Federated Identity Manager runtime:
Example:
Runtime Information
----------------------------------------------
Current deployed version 6.2.2.2 [120529a]
NOTE: The number within the brackets [120529a]
might be different from this example.
After you install the fix pack and redeploy the Tivoli Federated Identity Manager runtime you must re-publish the plug-ins to the runtime and reload the configuration.
Use the following procedure to re-publish the plug-ins:
If you want to return your installation to the state it was in before installing the fix pack, you can uninstall the fix pack.
For example, if you installed fix pack 2 onto a Federated Identity Manager 6.2.2.0 system, then after uninstalling fix pack 2 you would see the following:
Suite Name Version
----------------------------------------------------------
Tivoli Federated Identity Manager 6.2.2.0 [111110a]
NOTE: If you are using the Kerberos Delegation STS module, you need to do the following to ensure the Kerberos Delegation DLL is not loaded in the Java Virtual Machine when it is replaced during runtime component deployment:
For example:
Runtime Information
----------------------------------------------
Current deployed version 6.2.2.0 [111110a]
The product documentation for Federated Identity Manager, Version 6.2.2, can be found in the information center for IBM Tivoli Federated Identity Manager.
Tivoli® Federated Identity Manager provides Web plug-ins for various HTTP web servers. The primary function of the plug-in is to extract the user identity information from the LTPA cookie in a web request. The plug-in also makes the identity information available to the target application hosted by the web server. The plug-in uses either HTTP headers or server variables, if supported by the web server.
This section covers the following topics:
The IBM® Tivoli Federated Identity Manager 6.2.2 fix pack 2 ships with updated Tivoli Federated Identity Manager plug-ins which were tested with current versions of the HTTP servers and operating systems.
Issue | Description | Work around |
---|---|---|
The IBM Tivoli Federated Identity Manager 6.2.2 GA installer cannot install the IIS plug-in on Windows Server 2008 | In the IBM Tivoli Federated Identity Manager 6.2.2 GA version, the IIS plug-in can be installed only on Windows Server 2003, and cannot be installed on Windows Server 2008 |
This is an issue when trying to install the Web plug-ins for Windows Server 2008 because the GA installer cannot install the Web plug-ins. An IBM Tivoli Federated Identity Manager component must be installed before installing any fix pack package. Install a lightweight IBM Tivoli Federated Identity Manager component such as Web Services Security Management. Then, use the Update Installer to install the web plug-in fix pack package. |
LTPA Cookie name
Tivoli Federated Identity Manager 6.2.2 fix pack 2 introduced the ability to modify the name of the LTPA cookie that the Web plug-ins can process.
The LTPA Cookie Name cannot be modified from the Tivoli Federated Identity Manager console.
It can be modified only in the itfimwebpi.xml file.
rpm -ivh /opt/IBM/FIM/webpi/x86_linux_2/gskit-installer/gsk7bas-7.0-4.38.i386.rpm
apache20: LoadModule fimwebpi_module /opt/IBM/FIM/webpi/x86_linux_2/lib/libitfimwebpi-apache20.so
apache22: LoadModule fimwebpi_module /opt/IBM/FIM/webpi/x86_linux_2/lib/libitfimwebpi-apache22.so
IHS 6.0: LoadModule fimwebpi_module /opt/IBM/FIM/webpi/x86_linux_2/lib/libitfimwebpi-apache20.so
IHS 7.0: LoadModule fimwebpi_module /opt/IBM/FIM/webpi/x86_linux_2/lib/libitfimwebpi-apache22.so
IHS 8.0: LoadModule fimwebpi_module /opt/IBM/FIM/webpi/x86_linux_2/lib/libitfimwebpi-apache22.so
export LD_LIBRARY_PATH=/opt/IBM/FIM/webpi/x86_linux_2/lib
export ITFIMWEBPI=/opt/IBM/FIM/webpi/x86_linux_2
C:\Program Files\IBM\FIM\webpi\x86_nt_4\gskit-installer>setup.exe setup.iss
C:\Program Files\IBM\FIM\webpi\x86_nt_4\bin>cscript.exe /nologo fimpiiiscfg.vbs -action list-webservers
C:\Program Files\IBM\FIM\webpi\x86_nt_4\bin>cscript.exe /nologo fimpiiiscfg.vbs -action config -path "c:\Program Files\IBM\FIM\webpi\x86_nt_4" -webserver <web-server-id>
C:\Windows\System32\inetsrv>appcmd.exe set config "<i>Default Web Site</i>" -section:system.webServer/isapiFilters/+"[name='ITFIMWEBPI',path='C:\Program Files\IBM\FIM\webpi\x86_nt_4\bin\itfimwebpi-iis.dll',enabled='True',enableCache='True']" /commit:apphost
ITFIMWEBPI=c:\Program Files\IBM\FIM\webpi\x86_nt_4
rpm -ivh /opt/IBM/FIM/webpi/amd64_linux_2/gskit-installer/gsk7bas64-7.0-4.38.x86_64.rpm
apache22: LoadModule fimwebpi_module /opt/IBM/FIM/webpi/amd64_linux_2/lib/libitfimwebpi-apache22.so
IHS 7.0: LoadModule fimwebpi_module /opt/IBM/FIM/webpi/amd64_linux_2/lib/libitfimwebpi-apache22.so
IHS 8.0: LoadModule fimwebpi_module /opt/IBM/FIM/webpi/amd64_linux_2/lib/libitfimwebpi-apache22.so
export LD_LIBRARY_PATH=/opt/IBM/FIM/webpi/amd64_linux_2/lib
export ITFIMWEBPI=/opt/IBM/FIM/webpi/amd64_linux_2
C:\Program Files (x86)\IBM\FIM\webpi\x86_64_nt_4\gskit-installer>GSK7BAS_64.msi
C:\Windows\System32\inetsrv>appcmd.exe set config -section:system.webServer/isapiFilters /+"[name='ITFIMWEBPI',path='C:\Program Files (x86)\IBM\FIM\webpi\x86_64_nt_4\bin\itfimwebpi-iis.dll',enabled='True',enableCache='True']" /commit:apphost
ITFIMWEBPI=C:\Program Files (x86)\IBM\FIM\webpi\x86_64_nt_4
Tivoli Federated Identity Manager Web plug-ins Custom LTPA Cookie Name
<pi:LTPAConfiguration id="uuid-6cd36543-3404-42fg-8314-0800200c9a66" ltpaPassword="@@LTPA_PASSWORD@@" ltpaCookieName="LtpaToken2"/>
The Web plug-in files are removed from the $FIMInstallLocation directory.
For x86 Windows
cd "C:\Program Files\IBM\FIM\webpi\x86_nt_4\bin" cscript.exe /nologo "C:\Program files\IBM\FIM\webpi\x86_nt_4\bin\fimpiiiscfg.vbs" -action unconfig
C:\Windows\System32\inetsrv>appcmd.exe set config "Default Web Site" -section:system.webServer/isapiFilters/-"[name='ITFIMWEBPI',path='C:\Program Files\IBM\FIM\webpi\x86_nt_4\bin\itfimwebpi-iis.dll',enabled='True',enableCache='True']" /commit:apphost
The Web plug-in files are removed from the $FIMInstallLocation directory.
C:\Windows\System32\inetsrv>appcmd.exe set config "Default Web Site" -section:system.webServer/isapiFilters/-"[name='ITFIMWEBPI',path='C:\Program Files (x86)\IBM\FIM\webpi\x86_64_nt_4\bin\itfimwebpi-iis.dll',enabled='True',enableCache='True']" /commit:apphost
When you use the Tivoli® Federated Identity Manager console or command line to import a JavaScript mapping rule, an empty Security Token Service Universal User (STSUU) is used as an input to validate the JavaScript.
Validating the JavaScript using an empty STUU input can cause problems. Problems occur when the JavaScript rule throws exceptions on cases that do not occur in their real federation runtime flow, but occurs when the empty STSUU is passed to the rule during validation.
If the JavaScript mapping rule throws an exception during validation, the Tivoli Federated Identity Manager console rejects it as bad syntax and does not load it.
When you use the Tivoli Federated Identity Manager console or command line to import a JavaScript mapping rule, the software runs basic JavaScript validation. The JavaScript validation process prevents the upload of a mapping rule with an invalid syntax.
When the Tivoli Federated Identity Manager console or command line validates the mapping rule, no real request exists. The variables are then populated with empty objects.
Your mapping rule might use conditional statements. The conditional statements make sense during real runtime operations, but do not work properly when empty objects are passed to it during validation.
importPackage(Packages.com.tivoli.am.fim.trustserver.sts); importPackage(Packages.com.tivoli.am.fim.trustserver.sts.uuser); importPackage(Packages.com.tivoli.am.fim.trustserver.sts.utilities); // Throw an STS exception if the STSUU does not contain an attribute I am expecting var attrvalue = stsuu.getAttributeValueByName("myattr"); if (attrvalue == null) { IDMappingExtUtils.throwSTSException('missing attribute');
As a workaround, create an empty-object-aware JavaScript rule to prevent it from throwing exceptions when it detects the empty STSUU.
Build a mechanism to detect the validation sequence into the rule itself and to not terminate with an exception if the rule is operating on empty objects.
The detection code varies depending on the assumptions you can make about request objects in your runtime flow. For example, an STSUU typically contains one or more attributes in the Principal, AttributeList , or ContextAttributes sections of the STSUU.
If it does not contain any attributes, it is an empty STSUU.
importPackage(Packages.com.tivoli.am.fim.trustserver.sts); importPackage(Packages.com.tivoli.am.fim.trustserver.sts.uuser); importPackage(Packages.com.tivoli.am.fim.trustserver.sts.utilities); var isEmptySTSUU = ( (stsuu.getPrincipalAttributeContainer().getNumberOfAttributes() == 0) && (stsuu.getAttributeContainer().getNumberOfAttributes() == 0) && (stsuu.getContextAttributesAttributeContainer().getNumberOfAttributes() == 0)); if (!isEmptySTSUU) { // rest of your normal runtime mapping rule logic goes here ....... }
OAuth authentication macros are now available in IBM Tivoli Federated Identity Manager, version 6.2.2, fix pack 2.
IBM® Tivoli® Federated Identity Manager supplies contextual authentication parameters in customizing login forms.
When using WebSEAL as the point of contact server, these are query-string parameters to the login page.
For WebSphere Application Server, they are in the WASReqURL cookie when the login page is loaded. The parameters are macros in the configuration of the authentication callback for the point of contact server profile.
NOTE: When you use the WebSphere point of contact, the value of the query string parameter needs to be URL decoded twice.
The OAuth 1.0 and 2.0 authorization endpoints in IBM® Tivoli® Federated Identity Manager, version 6.2.2, fix pack 2, now support OAuth parameters in the HTTP POST body.NOTE: The Tivoli Access Manager configuration utility was modified to attach an unauthenticated ACL to the authorization endpoints instead of an authenticated ACL.
If you have existing OAuth federations that use Tivoli Access Manager WebSEAL as their point of contact that were created with an earlier version (before IBM Tivoli® Federated Identity Manager 6.2.2 fix pack 2), rerun the Tivoli Access Manager configuration utility after updating to IBM Tivoli® Federated Identity Manager 6.2.2 fix pack 2.
The following table indicating how an OAuth federation populates the authentication macros is added in the Supported macros for customizing an authentication login form section of the Configuration Guide.
Macro | Query-String Parameter name | Description and value |
---|---|---|
%FEDID% | FedId | A unique identifier (UUID) used internally by Tivoli Federated Identity Manager to identify the federation. |
%FEDNAME% | FedName | The user-assigned name of the federation. |
%PARTNERID% | PartnerId | The OAuth unique client identifier. |
%TARGET% | Target | OAuth client redirection URI. |
%SSOREQUEST% | SSORequest | A base-64 encoded string representing the query and body parameters from the OAuth request. |
Use the following documentation updates for the corresponding IBM® Tivoli® Federated Identity Manager versions:
In the IBM Tivoli Federated Identity Manager Web Service Security Management Configuration Guide, under the Configuring WebSphere Application Server, add a subsection that describes methods to associate the shared library with web service applications after the Configuring for a Cluster Environment section. See the following instructions:
In the IBM Tivoli Federated Identity Manager Web Service Security Management Configuration Guide, under the section Configuring WebSphere Application Server, the fifth step to configure WebSphere Application Server is changed into: You must associate the shared library with web service provider and requester applications before the shared library can be used by these applications.
There was an error in the command value used for installing the Tivoli Federated Identity Manager, version 6.2.2 Web Services Security Management feature.
Replace the installation command note in the following sections of the Tivoli Federated Identity Manager, version 6.2.2 Installation Guide:
with the following:
NOTE: The installation is designed so that the WebSphere® Application Server deployment can listen on localhost. If it does not listen on localhost, use the parameter websphereProperties.adminClientConnectorHost on the installation command to specify the host name. For example, on Linux:
./install_linux_x86.bin -W
websphereProperties.adminClientConnectorHost=<hostname>
The AuthenticatingAuthority attribute is a unique identifier that determines the authenticating authority involved in the authentication of the principal.
An example of an authenticating authority is WebSEAL. For scenarios where you might have multiple authenticating authorities, this feature helps in identifying the specific authentication authority that authenticated the principal. Service providers can then use this information to carry out different actions.
To enable this capability, you must add the following STSUUSER attribute:
Insert the AuthenticatingAuthority attribute in the mapping rule as shown in the examples.
importPackage(Packages.com.tivoli.am.fim.trustserver.sts); importPackage(Packages.com.tivoli.am.fim.trustserver.sts.uuser); ... // Example of adding the AuthenticatingAuthority for SAML 2.0 var authenticatingAuthorityAttr = new Attribute("AuthenticatingAuthority", "urn:oasis:names:tc:SAML:2.0:assertion", "https//idp.example.com"); stsuu.addAttribute(authenticatingAuthorityAttr);
<xsl:stylesheet extension-element-prefixes="mapping-ext" version="1.0"> <xsl:strip-space elements="*"/> <xsl:output method="xml" version="1.0" encoding="utf-8" indent="yes"/> ... - <xsl:template match="//stsuuser:AttributeList"> - <stsuuser:AttributeList> - <!-- Example of adding the authenticating authority attribute --> - <stsuuser:Attribute name="AuthenticatingAuthority" type="urn:oasis:names:tc:SAML:2.0:assertion"> <stsuuser:Value>https//idp.example.com</stsuuser:Value> </stsuuser:Attribute> </stsuuser:AttributeList> </xsl:template> ... </xsl:stylesheet>
When the AuthenticatingAuthority subelement is available in the AuthnContext element of the SAML 2.0 assertion, the following STSUUSER attribute is available at the Service Provider:
<stsuuser:Attribute name="AuthenticatingAuthority" type="urn:oasis:names:tc:SAML:2.0:assertion"> <stsuuser:Value>https://idp.example.com</stsuuser:Value>; </stsuuser:Attribute>"After obtaining information from this attribute, service providers can then perform any required actions.
Configuration example: SAML20.IDP.UnsolicitedSSO.RelayState.URLEncoding = true
Configuration example: SAML20.IDP.UnsolicitedSSO.RelayState.URLEncoding_<FEDERATIONID> = true
Example for a federation with the ID https://idp/sps/fed/saml20:
SAML20.IDP.UnsolicitedSSO.RelayState.URLEncoding_https://idp/sps/fed/saml20 = true
Configuration example: SAML20.IDP.UnsolicitedSSO.RelayState.URLEncoding_<FEDERATIONID>_<PARTNERID>= true
Example for a federation with the ID https://idp/sps/fed/saml20 and its partner with the ID https://sp/sps/fed/saml20
SAML20.IDP.UnsolicitedSSO.RelayState.URLEncoding_https://idp/sps/fed/saml20_https://sp/sps/fed/saml20 = true
Default value: True
<FEDERATIONID> represents the Provider ID of the federation and <PARTNERID> represents the Provider ID of the partner. You can obtain the Provider ID of the federation from the Federation Properties page in the console while the Provider ID of the partner can be obtained from the Partner Properties page in the console.
When at least one of the settings is false, add the macro @TOKEN:RelayState@ to the list of comma-separated list of tokens in the runtime custom property SPS.PageFactory.HtmlEscapedTokens. Add the macro so that the RelayState is HTML-escaped in the authentication response.
Configuration example:
SAML20.SP.UnsolicitedSSO.RelayState.URLEncoding = true
Configuration example: SAML20.SP.UnsolicitedSSO.RelayState.URLEncoding_<FEDERATIONID> = true
Example for a federation with the ID https://sp/sps/fed/saml20:
SAML20.SP.UnsolicitedSSO.RelayState.URLEncoding_https://sp/sps/fed/saml20 = true
Configuration example: SAML20.SP.UnsolicitedSSO.RelayState.URLEncoding_<FEDERATIONID>_<PARTNERID>= true
Example for a federation with the ID https://sp/sps/fed/saml20 and its partner with the ID https://idp/sps/fed/saml20:
SAML20.SP.UnsolicitedSSO.RelayState.URLEncoding_https://sp/sps/fed/saml20_https://idp/sps/fed/saml20 = true
Default value: True
<FEDERATIONID> represents the Provider ID of the federation and <PARTNERID> represents the Provider ID of the partner. You can obtain the Provider ID of the federation from the Federation Properties page in the console while the Provider ID of the partner can be obtained from the Partner Properties page in the console.
For Tivoli Federated Identity Manager 6.2.2 release, the Trust Service custom property must add the new custom property.
Default value: True
The SAML STS Modules validates that the token provided on the STS request is the correct type. The STS obtains the input token from either the Base element of the RequestSecurityToken message or from the WS-Security headers included on the SOAP envelope.
If multiple security headers are included on the SOAP envelop, Tivoli Federated Identity Manager selects the very first one that it finds even if the STS module configured to consume the token can handle the token type retrieved.
To enable the SAML STS modules to notify the STS of the expected token type so that the correct token is retrieved from the SOAP envelop headers, enable the following custom property:
sts.multiple.tokens.security.header.enabled=true
SPS.http.request.claims.enabled%SELF_PROVIDER_ ID%PARTNER_PROVIDER_ID=trueWhere:
SAML 2.0 example:
SPS.http.request.claims.enabled%https:// saml20sp:444/FIM/sps/saml20sp/saml20%https:// saml20ip/FIM/sps/saml20ip/saml20
SPS.http.request.claims.enabled%SELF_PROVIDER_ID% ADVERTISED_TRUST_ROOT
SPS.http.request.claims.enabled%SELF_PROVIDER_ID% OPENID_SERVER_ENDPOINTWhere:
OpenID Identity Provider example:
SPS.http.request.claims.enabled%https://fimabcip:9443/ sps/openidip/openid%https://fimxyzsp:9443/
OpenID Service Provider example:
SPS.http.request.claims.enabled%https://fimxyzsp:9443/ sps/openidsp/openid%https://fimabcip:9443/sps/ openidip/openid/sso
SPS.http.request.claims.enabled%SELF_PROVIDER_ID%CLIENT_IDWhere:
OAuth example:
SPS.http.request.claims.enabled%https://fimabc:9443/ sps/oauth20fed1/oauth20%Adxfwregw5mL8oP90gZz
Federation level custom property:
SPS.http.request.claims.enabled%SELF_PROVIDER_ID=true
Example:
SPS.http.request.claims.enabled%https:// saml20sp:444/FIM/sps/saml20sp/saml20=true
Configuration example:
SPS.http.request.claims.enabled=true
Default value: False
The request cookies, headers, and parameters in an HTTP request might be numerous and result in a large claims element. You can filter for request cookies, headers, and parameters by using a custom property. Use the custom property to avoid including information that cannot not be processed by the Security Token Service.
Use the following custom property to specify the request cookies, headers, and parameters to include in the claims element.
The custom property name is: SPS.http.request.claims.filter.spec
For each data type, you can choose to add all values or filter the values based on the item name.
The default filter is: cookies=*:headers=*
The default filter causes all cookies and headers to be included and excludes all parameters.
The format for the filter specification syntax is:
cookies=[*|cookieName1,cookieName2]:
headers=[*|header1,header2]: parameters=[*|param1,param2]
cookies=MyCookieTo retrieve all cookies in the request but exclude all parameters and headers, set the custom property to:
SPS.http.request.claims.filter.spec = cookies=*
<Cookie Name="MyCookie" Type="urn:ibm:names:ITFIM:httprequest:cookies"> <Value>MyValue; %2F; my.domain</Value> </Cookie>
An example of using the custom property to enable all the cookies, headers, and parameters is:
SPS.http.request.claims.filter.spec = cookies=*:headers=*:parameters=*
The resulting HTTPRequestClaims element is:
<HTTPRequestClaims xmlns="urn:ibm:names:ITFIM:httprequest"> <Attributes> <Attribute Name="remoteAddress" Type="urn:ibm:names:ITFIM:httprequest:remoteAddress"> <Value>127.0.0.1</Value> </Attribute> <Attribute Name="remoteHost" Type="urn:ibm:names: ITFIM:httprequest:remoteHost"> <Value>fim620</Value> </Attribute> <Attribute Name="protocol" Type="urn:ibm:names:ITFIM: httprequest:protocol"> <Value>HTTP</Value> </Attribute> <Attribute Name="method" Type="urn:ibm:names:ITFIM: httprequest:method"> <Value>POST</Value> </Attribute> <Attribute Name="pathInfo" Type="urn:ibm:names:ITFIM: httprequest:pathInfo"> <Value>/saml20sp/saml20/login</Value> </Attribute> <Attribute Name="queryString" Type="urn:ibm:names:ITFIM:httprequest:queryString"> <Value>Test=value</Value> </Attribute> <Attribute Name="requestURI" Type="urn:ibm:names: ITFIM:httprequest:requestURI"> <Value>/sps/saml20sp/saml20/login</Value> </Attribute> <Locales> <Locale Name="locales" Type="urn:ibm:names: ITFIM:httprequest:locales"> <Value>en_US</Value> <Value>en</Value> </Locale> </Locales> </Attributes> <Headers> <Header Name="iv-creds" Type="urn:ibm:names:ITFIM: httprequest:headers"> <Value>Version=1, BAKs3DCCBO0MADCCBOcwggT....WgQA </Value> </Header> <Header Name="keep-alive" Type="urn:ibm:names:ITFIM: httprequest:headers"> <Value>115</Value> </Header> <Header Name="accept-charset" Type="urn:ibm:names: ITFIM:httprequest:headers"> <Value>ISO-8859-1,utf-8;q=0.7,*;q=0.7</Value> </Header> <Header Name="accept" Type="urn:ibm:names:ITFIM: httprequest:headers"> <Value>text/html,application/xhtml+xml, application/xml;q=0.9,*/*;q=0.8 </Value> </Header> <Header Name="host" Type="urn:ibm:names:ITFIM: httprequest:headers"> <Value>fim620:9081</Value> </Header> <Header Name="iv-user" Type="urn:ibm:names: ITFIM:httprequest:headers"> <Value>elain</Value> </Header> <Header Name="referer" Type="urn:ibm:names:ITFIM: httprequest:headers"> <Value>https://saml20ip/FIM/sps/saml20ip/saml20/ login?SAMLRequest=nVNdT8IwFP0rS....d%2FmV928%3D </Value> </Header> <Header Name="via" Type="urn:ibm:names:ITFIM: httprequest:headers"> <Value>HTTP/1.1 fim620:444</Value> </Header> <Header Name="content-type" Type="urn:ibm:names: ITFIM:httprequest:headers"> <Value>application/x-www-form-urlencoded</Value> </Header> <Header Name="iv-groups" Type="urn:ibm:names:ITFIM: httprequest:headers"> <Value /> </Header> <Header Name="iv_server_name" Type="urn:ibm:names: ITFIM:httprequest:headers"> <Value>webseald-sp-webseald-localhost</Value> </Header> <Header Name="user_session_id" Type="urn:ibm:names: ITFIM:httprequest:headers"> <Value>bG9jYWxob3N0LXdlYnNlYWxkLXNwAA==_9ZlLTwIAAAAwA AAAgB1uCTNsc1Y3Mk5Nc2N4WnpZQThTVGFIUFNleVJwcC1hRTgrU1J sNjJadkhRT3RXYTZIVQ==:default </Value> </Header> <Header Name="content-length" Type="urn:ibm:names: ITFIM:httprequest:headers"> <Value>6245</Value> </Header> <Header Name="accept-language" Type="urn:ibm:names: ITFIM:httprequest:headers"> <Value>en-us,en;q=0.5</Value> </Header> <Header Name="connection" Type="urn:ibm:names:ITFIM: httprequest:headers"> <Value>close</Value> </Header> </Headers> <Cookies> <Cookie Name="fim_ivtapp_target" Type="urn:ibm:names: ITFIM:httprequest:cookies"> <Value>https%3A%2F%2Fsaml20sp%3A444%2FFIM%2Ffimivt% 2Fprotected%2Fivtlanding.jsp </Value> </Cookie> <Cookie Name="https%3a%2f%2fsaml20sp%3a444%2ffim%2fsps% 2fsaml20sp%2fsaml20fimsaml20" Type="urn:ibm:names:ITFIM:httprequest:cookies"> <Value>uuidbf50ca56-0135-1d3f-89fa-883ae744b81b</Value> </Cookie> <Cookie Name="jsessionid" Type="urn:ibm:names:ITFIM: httprequest:cookies"> <Value>0000ZOelYEj9RH1aQVymcofXoKc:-1</Value> </Cookie> <Cookie Name="iv_jct" Type="urn:ibm:names: ITFIM:httprequest:cookies"> <Value>%2FFIM</Value> </Cookie> </Cookies> <Parameters> <Parameter Name="Test" Type="urn:ibm:names:ITFIM:httprequest:query:param"> <Value>value</Value> </Parameter> <Parameter Name="RelayState" Type="urn:ibm:names: ITFIM:httprequest:body:param"> <Value>uuidbf50ca56-0135-1d3f-89fa-883ae744b81b</Value> </Parameter> <Parameter Name="SAMLResponse" Type="urn:ibm:names: ITFIM:httprequest:body:param"> <Value>nVNdT8IwFP0rS....d%2FmV928%3D</Value> </Parameter> </Parameters> </HTTPRequestClaims>
In the example, the cookies, headers, and parameters are filtered according to the specified values.
This example filters the jsessionid cookie, host header, and RelayState parameter:
SPS.http.request.claims.filter.spec =
cookies=jsessionid:headers=host:parameters=RelayState
The resulting HTTPRequestClaims element is:
<HTTPRequestClaims xmlns="urn:ibm:names:ITFIM:httprequest"> <Attributes> <Attribute Name="remoteAddress" Type="urn:ibm:names:ITFIM:httprequest:remoteAddress"> <Value>127.0.0.1</Value> </Attribute> <Attribute Name="remoteHost" Type="urn:ibm:names:ITFIM:httprequest:remoteHost"> <Value>fim620</Value> </Attribute> <Attribute Name="protocol" Type="urn:ibm:names:ITFIM:httprequest:protocol"> <Value>HTTP</Value> </Attribute> <Attribute Name="method" Type="urn:ibm:names:ITFIM:httprequest:method"> <Value>POST</Value> </Attribute> <Attribute Name="pathInfo" Type="urn:ibm:names:ITFIM:httprequest:pathInfo"> <Value>/saml20sp/saml20/login</Value> </Attribute> <Attribute Name="queryString" Type="urn:ibm:names:ITFIM:httprequest:queryString"> <Value>Test=value</Value> </Attribute> <Attribute Name="requestURI" Type="urn:ibm:names:ITFIM:httprequest:requestURI"> <Value>/sps/saml20sp/saml20/login</Value> </Attribute> <Locales> <Locale Name="locales" Type="urn:ibm:names:ITFIM:httprequest:locales"> <Value>en_US</Value> <Value>en</Value> </Locale> </Locales> </Attributes> <Headers> <Header Name="host" Type="urn:ibm:names:ITFIM:httprequest:headers"> <Value>fim620:9081</Value> </Header> </Headers> <Cookies> <Cookie Name="jsessionid" Type="urn:ibm:names:ITFIM:httprequest:cookies"> <Value>0000sOnmzkbGcYdIcevoYRuxq0m:-1</Value> </Cookie> </Cookies> <Parameters> <Parameter Name="RelayState" Type="urn:ibm:names:ITFIM:httprequest:body:param"> <Value>uuidbfd7cb00-0135-177e-9c06-fa9b2fb1485f</Value> </Parameter> </Parameters> </HTTPRequestClaims>
<stsuuser:RequestSecurityToken> ....... <stsuuser:Attribute name="Claims" type="com:tivoli:am:fim:sts:RST"> <stsuuser:Value> <wst:Claims Dialect="urn:ibm:names:ITFIM:saml" xmlns:wst="http://schemas.xmlsoap.org/ws/2005/02/trust"> <fimc:Saml20Claims AssertionConsumerServiceURL= "https://saml20sp:444/FIM/sps/saml20sp/saml20/login" DefaultNameIDFormat= "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" InResponseTo="FIMREQ_ed579ffa-0134-1f44-a1f3-886448eada7e" ProtocolProfile="urn:oasis:names:tc:SAML:2:0:profiles:SSO" RelayState="uuided51083a-0134-1634-825f-f3cdd64676bd" SignatureValidated="true" Target= "https://saml11sp:444/FIM/fimivt/protected/ivtlanding.jsp" xmlns:fimc="urn:ibm:names:ITFIM:saml"> <fimc:PrincipalName>elain</fimc:PrincipalName> </fimc:Saml20Claims> </wst:Claims> </stsuuser:Value> <stsuuser:Value> <wst:Claims Dialect="urn:ibm:names:ITFIM:httprequest" xmlns:wst="http://schemas.xmlsoap.org/ws/2005/02/trust"> <HTTPRequestClaims xmlns="urn:ibm:names:ITFIM:httprequest"> ........ </HTTPRequestClaims> </wst:Claims> </stsuuser:Value> </stsuuser:Attribute> ....... </stsuuser:RequestSecurityToken>
IBM® Tivoli® Federated Identity Manager version 6.2.2, fix pack 2 supports Kerberos authentication using 64-bit DLL.
Prerequisite:
Install Microsoft Visual C++ 2010 Redistributable Package on your computer.
Reference:
For instructions on how to configure a typical environment for Kerberos authentication, see the IBM Tivoli Access Manager: WebSEAL Kerberos Junctions article in the developerWorks® wiki (http://www.ibm.com/developerworks/ tivoli/library/t-tamwkj/).
See the related formal IBM document available at: http://www-01.ibm.com/ support/search.wss?q=6.1.0-TIV-ITAMEBI-1.0.03-AmMsIISAdapter.
NOTE: For details in using IBM Tivoli Access Manager and IBM Tivoli Federated Identity Manager to issue Kerberos authentication to Microsoft Exchange 2010 and Microsoft SharePoint 2010, see Using Kerberos for Microsoft Windows Authentication Foundation Guide (https://www-304.ibm.com/support/ entdocview.wss?uid=swg24029517).
You can configure the Tivoli Federated Identity Manager Single Sign-on Protocol Service (SPS) SAML 2.0 implementation to use the urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified name identifier format. You can choose to use this name identifier format when issuing a SAML assertion in a single sign-on flow.
By default, Tivoli Federated Identity Manager treats a urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified name identifier as a urn:oasis:names:tc:SAML:2.0:nameidformat:persistent name identifier. This means that the SAML 2.0 implementation invokes the alias service to determine the user identity.
To avoid the call to the alias service, set the DefaultNameIDFormat configuration property to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
About this task
After the Tivoli Federated Identity Manager 6.2.2 Fixpack 2 is installed, follow the procedure below.
Procedure
Modify the mapping rule of your federation and add the following attribute on the attribute list section of the STSUU.
<stsuuser:Attribute name="AZN_CRED_AUTH_METHOD" type="urn:ibm:names:ITFIM:5.1:accessmanager"> <stsuuser:Value>password</stsuuser:Value> </stsuuser:Attribute>
The Tivoli Federated Identity Manager User Self Care (USC) feature sends a user enrollment validation email to complete the user enrollment process.
A link is included in the email that users need to access to complete the enrollment process. The USC code indexes the outstanding user enrollment in the cache using a nonce value. The nonce value is added to the validation URL as a query string parameter.
The current USC only returns the nonce as part of the validation URL.
In some scenarios, you might need to get access to the nonce value without it being part of the validation URL.
To provide this flexibility, you can enable the USC email validation code to include two macros that can be used to generate the email content:
The Tivoli Federated Identity Manager Security Trust Service (STS) chain does not support the RequestType and KeyType elements on the RequestSecurityTokenResponse message.
The RequestType value must be set to the value received on the request. The KeyType must be set to one of the values supported by WS-Trust based on an attribute on the STSUU structure.
To enable the ability to set the KeyType use the following sample xsl fragment:
<xsl:template match="//stsuuser:ContextAttributes"> <stsuuser:ContextAttributes> <!-- Add the key type to the Request Security Token Response generated by the SAML module --> <stsuuser:Attribute name="RequestSecurityTokenResponse.KeyType" type="urn:ibm:names:ITFIM:5.1:accessmanager"> <stsuuser:Value>http://docs.oasis-open.org/ws-sx/ws-trust/200512/PublicKey</stsuuser:Value> </stsuuser:Attribute> </stsuuser:ContextAttributes> </xsl:template>The new property RequestSecurityTokenResponse.KeyType allows the administrator to set the KeyType on theRequestSecurityTokenResponse.
In this scenario, the KeyType is set to: http://docs.oasis-open.org/ws-sx/ws-trust/200512/PublicKey.
For more information about other valid values, see the WS-Trust specification from the OASIS Website.
SAML20.IDP.ACSUrlPattern_https://ip.example.com/sps/saml20ip/
saml20_https://sp.example.com/sps/saml20sp/saml20 = https://sp.example.com/sps/saml20sp/saml20(\\?(\\S+?)=(\\S+?))?
SAML20.IDP.ACSUrlPattern_https://ip.example.com/sps/saml20ip/
saml20_https://sp.example.com/sps/saml20sp/saml20_urn:oasis:
names:tc:SAML:2.0:bindings:HTTP-POST = https://sp.example.com/sps/saml20sp/saml20(\\?(\\S+?)=(\\S+?))?
The fedId value is the provider ID in the federation properties page.
The partnerId value is the provider ID in the partner properties page.
It means that if both custom runtime properties are used, Tivoli Federated Identity Manager will use the regex pattern in which the specified binding value matches the value used for <binding> first.
None.
Issue:
After uninstalling the fix pack, the user can deploy the base version of Tivoli® Federated Identity Manager from the Runtime Node Management panel.
After deploying the runtime, the Runtime Management panel shows the correct version of Tivoli Federated Identity Manager.
However, the Runtime Nodes panel shows an incorrect Runtime version.
Workaround:
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785
U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to:
Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
1623-14, Shimotsuruma, Yamato-shi
Kanagawa 242-8502 Japan
The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement might not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information that has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758
U.S.A.
Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.
The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent agreement between us.
Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurement may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
All statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental.
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.
Adobe®, Acrobat, PostScript® and all Adobe-based trademarks are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, other countries, or both.
IT Infrastructure Library® is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce.
Intel®, Intel logo, Intel Inside®, Intel Inside logo, Intel Centrino®, Intel Centrino logo, Celeron®, Intel Xeon®, Intel SpeedStep®, Itanium®, and Pentium® are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
Linux® is a trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT®, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
ITIL® is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.
UNIX® is a registered trademark of The Open Group in the United States and other countries.
Cell Broadband Engine™ and Cell/B.E. are trademarks of Sony Computer Entertainment, Inc., in the United States, other countries, or both and is used under license therefrom.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
Other company, product, and service names may be trademarks or service marks of others.
End of the IBM® Tivoli® Federated Identity Manager 6.2.2-TIV-TFIM-FP0002.README file.