This section contains the following topics:
Federation Web Services Trace Logging
Federation Services Trace Logging (smtracedefault.log)
Federation Web Services Trace Logging (FWSTrace.log)
Secure Proxy Engine Logs for Federation
Resolving Signature Verification Failures
Federation Database Objects Trace
The Web Agent trace logging facility and the Policy Server Profiler monitor the performance of the Web Agent and Policy Server. These logging mechanisms provide comprehensive information about CA SiteMinder® operation so you can analyze the system performance and can troubleshoot issues.
For partnership federation, several logging components are available to collect trace messages for federated communication. Trace messages provide detailed information about system operation. Trace messages are ordinarily turned off during normal operation. You can enable them to extract in-depth information in addition to the trace message itself. For example, you can look at the fwstrace.log to see the generated SAML assertion or collect the name of the current user.
The collected trace messages are written to a trace log. The fwstrace.log is located in the directory web_agent_home/log.
You can establish trace logs at the Web Agent and the Policy Server to monitor CA SiteMinder® operation.
The profiler is the Policy Server facility for logging. You can use the profiler to collect trace messages for federation services and write them to the smtracedefault.log file.
The component that controls the trace messages for federation services at the Policy Server is the Fed_Server component.
The Policy Server Profiler allows you to trace internal Policy Server diagnostics and processing functions.
Follow these steps:
Important! If you are accessing this graphical user interface on Windows Server 2008, open the shortcut with Administrator permissions. Use Administrator permissions even if you are logged in to the system as an Administrator. For more information, see the release notes for your CA SiteMinder® component.
Notes:
Changes to the Profiler settings take effect automatically. However, if you restart the Policy Server, a new output file (if the Profiler is configured for file output) is created. The existing Profiler output file is automatically saved with a version number. For example:
smtracedefault.log.1
If changes to the Logging or Tracing facility settings are not related to the Profiler output file, for example, enabling/disabling the console logging on Windows, the existing file is appended with new output without saving a version of the file.
By default The Policy Server retains up to ten output files (the current file and nine backup files). Older files are replaced automatically with newer files when the ten file limit is reached. You can change the number of files to retain by configuring the TraceFilesToKeep DWORD registry setting to the required decimal value. The TraceFilesToKeep registry setting must be created in the following registry location:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Netegrity\SiteMinder\CurrentVersion\ LogConfig\TraceFilesToKeep
The Profiler tab has a "Buffered Tracing" option, which is set by default to improve Policy Server performance. This option is on Solaris systems only.
To make the task of collecting tracing data simpler, a series of preconfigured templates are installed with the Policy Server. You can use these templates instead of creating your own trace configuration file to collect the data that gets written to a trace log.
The following templates are available for trace logging related to the Identity Provider and the Service Provider, such as assertion generation or SAML authentication.
Template |
Tracing Messages Collected |
---|---|
samlidp_trace.template |
Collects messages for Identity Provider activity |
samlsp_trace.template |
Collects messages for Service Provider activity |
Look at each template to see the exact contents. The templates are located in siteminder_home/config/profiler_templates.
To simplify the task of collecting tracing data simpler, a series of preconfigured templates are installed with the Web Agent Option Pack. You can use these templates instead of creating your own trace configuration file to collect the data.
The following templates are available:
Template |
Tracing Messages Collected |
---|---|
FWSTrace.conf |
Default template. Collects data that you specify. |
FWS_SSOTrace.conf |
Collects single sign-on messages |
FWS_SLOTrace.conf |
Collects single logout messages |
FWS_IPDTrace.conf |
Collects Identity Provider Discovery Profile messages |
All the FWS templates include the Fed_Client component and subcomponents for the specific data being tracked. To see the exact contents, open each template.
Follow these steps:
Note: Do not edit the template directly.
The templates determine the federation components that the federation system monitors. To enable trace logging and format how the data appears in the log file, modify the Logger.Config properties file.
Follow these steps:
Note: You can rename the log file. FWSTrace.log is the default name.
Specify only one template. All the templates reside in the directory web_agent or web_agent_option_pack_home/config.
The following text is an excerpt from the FWS_SLOTrace.conf template. Most of the file contains comments and instructions on how to use the file, the command syntax, and the available subcomponents for the Fed_Client component.
The excerpt shows the component, Fed_Client and the subcomponents (Single_Logout and Configuration) that are monitored. The excerpt also shows the specific data fields that indicate the required contents of each message (Date, Time, Pid, Tid, TransactionId, SrcFile, Function, Message).
components: Fed_Client/Single_Logout, Fed_Client/Configuration data: Date, Time, Pid, Tid, TransactionID, SrcFile, Function, Message
If you modify any part of the federation configuration, flush the Federation Web Services cache for the changes to appear in the trace logs.
Note: A brief delay can occur from when the changes are made and when Federation Web Services receives the information.
To flush the cache
The Cache Management page displays.
Partnership-based federation contains a secure proxy engine that forwards traffic to backend servers. The secure proxy engine includes the following components:
Acts as the HTTP listener, handling HTTP traffic for incoming requests, and can handle HTTPS traffic, once properly configured.
Provides a servlet container for the operation of the UI. The Apache web server communicates to the Tomcat server through a Tomcat connector named mod_jk.
You can supply CA Support with log files related to these components to troubleshoot problems in your partnership federation environment.
Two Apache logs that aid partnership federation troubleshooting are:
mod_jk.log is enabled by default with the product. After the first contact with the federation server, information begins logging to this file. The mod_jk.log file is located in federation_mgr_home\logs\fws.
To modify this log file:
JkLogFile "federation_mgr_home/logs/fws/mod_jk.log"
JkLogLevel error
To disable the mod_jk.log, comment out or remove these lines from the file.
For debug purposes only, you can enable the httpclient.log. The httpclient.log file is located in federation_mgr_home\secure-proxy\proxy-engine\logs.
To modify this log file:
httpclientlog="yes"
To modify the location of the httpclient.log file and the log level, edit the httpclientlogging.properties file. This file is in the directory federation_mgr_home\secure-proxy\Tomcat\properties.
A malicious user can commit an XML signature wrapping attack by changing the content of a document without invalidating the signature. By default, software controls for the Policy Server and Web Agent Option Pack are set to defend against signature wrapping attacks. However, a third-party product can issue an XML document in a way that does not conform to XML specifications. As a result, the default signature checks can result in a signature verification failure.
Signature verification failures occur for the following reasons:
If a federation transaction fails, examine the smtracedefault.log file and the fwstrace.log file for a signature verification failure. These errors can indicate that the received XML document is not conforming to XML standards. As a workaround, you can disable the default Policy Server and Web Agent protection against signature wrapping attacks.
Important! If you disable the protection against signature vulnerabilities, determine another way to protect against these attacks.
To disable the XML signature wrapping checks:
web_agent_option_pack_ home/affwebservices/web-INF/classes.
Note: If the web agent option pack is installed on the same system as the web agent, the file resides in the web_agent_home directory.
Note: The value of the DisableUniqueIDCheck setting must be the same for the Policy Server and the Web Agent Option Pack.
Enable XPS validation and federation object tracing to monitor federation database activities. CA SiteMinder® logs these activities to the smps.log file, in the directory siteminder_home\log.
Follow these steps:
Type the command as it is shown here. The command is case-sensitive.
The Products Menu displays.
The Parameters Menu displays.
When set to true, the parameter enables tracing for XPS Validation warnings.
When set to true, the parameter enables XPS trace debugging.
The FED parameters menu display.
When set to true, the TRACE parameter enables tracing for federation XPS objects.
Changes made in XPSConfig are not recognized until you exit the XPSConfig tool. Where noted, some changes require that you restart services.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|