Once the credential sets have been created for your end
users, you now have to activate the Single Sign-On component. Activating
single sign-on involves editing properties files, setting variables, etc.
Depending on the type of application you are deploying, the steps to be performed are different. There are two groups of applications:
The following table sums up the relevant SSO activation tasks, depending on whether you are deploying SSO for Webtop or Wintop applications:
Warning: Wintop and Webtop applications (for example, LCA Navigator and the LCA Classic, the VPC product) cannot by default share access to the same ENOVIA server in SSO mode. For a detailed explanation of how to enable this function, refer to Enabling Wintop and Webtop Applications to Share the Same ENOVIA V5 Server. |
|||||||||||||
Deployment PossibilitiesThe deployment diagrams in Deploying Wintop and Webtop Applications identify the software components involved but do not specify on which machine they are located. Important: we recommend that the V5 code installation path deployed in the WAS resides on the same machine as the WAS. Test Configuration: All Code on the Same MachineIt is quite possible, for example in the case of Webtop applications, to install all the ENOVIA server code (including for example Webtop applications) on the same machine as the WAS, in which case there is only one V5 installation path, like this: The only use for this type of deployment is, for example, to test the software before deciding to deploy it on different machines. Please note, however, that this is not a recommended deployment scenario. Recommended Industrial Production Scenario: Server Code On One Machine, and WAS and V5 Code on Another MachineWe recommend that you deploy ENOVIAV5VPM server code on one machine, and deploy the V5 code in the WAS together on a different machine. In this illustration, we illustrate how to deploy Webtop applications in the WAS on the same machine:
|
|||||||||||||
Activating SSO in the Installation Path Deployed in the Web Application Server (Wintop or Webtop)To activate SSO for either Webtop or Wintop applications, the following steps are required to activate the SSO component in the Web Application Server, and must be performed in the installation path for the V5 application deployed in the Web Application Server. When you have the WAS and V5 code on one machine, and the ENOVIAV5VPM server on another, you must edit two files in the installation path of the V5 code deployed on the same machine as the WAS. Activating SSO in the Install Path Deployed in the WAS
The result is now this:
|
|||||||||||||
Activating SSO on the ENOVIA Server (Wintop or Webtop) and ENOVIA Client Side (Wintop only)You also have to:
in addition to the steps you already performed in Activating SSO in the Web Application Server for Webtop and Wintop Applications. Activating SSO on the ENOVIA ServerThe following operations are required to activate the SSO component for the ENOVIA server and must be performed in the V5 installation path of the ENOVIA server:
The result is now this:
Activating SSO on the Wintop ClientIf you installed a Wintop client (for example, the LCA Classic), you must activate the SSO component by editing the following files in the V5 installation path of each client.
The result is now this:
|
|||||||||||||
Importance of Exporting the CATJWSServiceDirectory, CATLoginServletHost and CATSMWebMode Variables for Webtop ApplicationsIf you are deploying SSO mode for Webtop applications, you can only
truly consider that the SSO mode has been successfully activated once you
have exported the The temptation is to take shortcuts. It is actually possible to deploy the LCA Navigator, for example, in the WAS, activate SSO partially in the installation path deployed in the WAS (that is, by editing only the SSOServer.properties and SSOClient.properties files, but without exporting the three above-mentioned variables on the ENOVIA server side), and log onto an LCA Navigator session using an LDAP identity. This gives the impression that the SSO mode is fully activated. The fact that you can then create and save ENOVIA V5 lifecycle objects reinforces this impression that you are working in SSO mode, whereas in reality this is not the case. THIS IS A PITFALL. This pitfall occurs irrespective of whether the WAS, the Webtop code and the ENOVIA server are on the same machine, or the WAS and Webtop code are on one machine, and the ENOVIA server on another. To illustrate this pitfall, and for the sake of simplicity, in the following scenarios the different software components are installed on the same machine. Scenario 1In this scenario:
Here is the credential set:
You will be able to log on without realizing that the SSO mode has not been fully activated: the SSO token has not been propagated:
What does that mean? The SSO token is an internal mechanism which transfers the correct credentials to the application process. If the variables are not exported, the application process started by the server manager will be owned by the OS user who started the server manager process, and not the P&O user. This is the process ownership hierarchy (using the process explorer tool on Windows): demonstrating that the owner of the server manager process is SES. This is the properties tab of an action created with the same credentials: demonstrating that the owner/creator of the action is SES. In concrete terms, this means that when creating objects using lifecycle functions, for example, the creator of ENOVIA V5 objects will be the OS user who started the server manager process, and not the P&O user. Consequently, the owner of all the objects you create will be identical: the OS user. This is not desired. Scenario 2In this scenario:
So the credential set is identical:
This is the process ownership hierarchy: demonstrating that the owner of the server manager process is still SES. This is the properties tab of an action created with the same credentials: demonstrating that the owner/creator of the action is this time the P&O user: SMQ. Note: the OS userid does NOT have to be declared in the P&O database. |
|||||||||||||
Enabling Wintop and Webtop Applications to Share the Same ENOVIA V5 ServerThere are two groups of applications:
By default, Webtop applications and Wintop applications cannot share access to the same ENOVIA V5 server in SSO mode. Warning: the same installation path must NOT contain both the code for the Wintop client (with SSO enabled) and the code for the Webtop application (with SSO enabled) required by the WebSphere Application Server. You can have the following configurations: Configuration 1In one installation path:
and in another installation path:
Configuration 2In one installation path:
and in another installation path:
However, you can enable Webtop applications and Wintop applications to effectively share access to the same server by following this scenario which involves duplicating the Orbix entry point, with one Orbix environment for Webtop applications and one for Wintop applications, then exporting a variable in the resulting Webtop environment:
This means that:
Note: This methodology can be easily implemented on the Windows OS. The purpose of the CATSMWebMode environment parameter is to differentiate two behaviors of the Server Manager, which are not compatible. Note that the |
|||||||||||||
Deactivating Single Sign-On and Deleting Credential SetsTo deactivate the Single Sign-On capability, you must undo the steps that were performed on the ENOVIA server and the client. Note: If you are using the default SSO Repository, to delete all credential sets that you created on the machine on which the server was installed, delete the file:
WARNING: We do not recommend that you use the default SSO Repository. To create your own SSO Repository, see the task Implementing Your Own SSO Repository. However, if you do use your own SSO Repository, you must manage the deactivation yourself. |
|||||||||||||
Customizing User Exits for VPM V4The repository database of VPM V4 must be configured to support server authentication for SSO to be enabled in VPM V4 (and therefore ENOVIAV5VPM). In addition to the ENOVIAV5VPM setup itself, other tasks must be performed in the environment of VPM V4 in order to complete the SSO setup when using ENOVIAV5VPM. To do so:
If data encryption is enabled on the server, the following variables must also be set in order to reference the correct library and encryption/decryption methods:
The default values should be:
which make VPM V4 use its built-in 64-bit encoding. All these variables should be set in the run-time environment of VPM V4. This could be done automatically by adding the adequate variable export commands to an initialization file, such as VPMWsUser.env. Note: the previous six environment variables are the same as those set in initialization file ssoinit.sh of ServerManager. The values always be the same for the first three servlet variables. The values of the other three may differ depending on the legacy encryption implementation. |
|||||||||||||
Servers CheckpointTroubleshooting Session ManagementSome database or WAS configuration mistakes can break Single Sign-On in a way which leads to an exception page whenever users try to open the Single Sign-On administration page. The following lines appear in the exception page:
Possible causes leading to this error are:
The following subsections will cover determining the problem's cause and fixing it. Fixing Single Sign-On not being able to connect to the Settings databaseThe error page quoted above shows up when Single Sign-On application is not able to connect to the Settings databases. The usual causes of this failure are:
If any changes to database or data source definition where made during these verification steps, stop and restart WAS to make sure all changes were taken into account. In case of a WAS ND-based deployment, also restart the node agents. Fixing Wrong session parameters at server or web application scopeAnother cause leading to the exception page can be a mistake in WAS session configuration. You can check session parameters with the following steps:
|