APS, out of the box, does not support password replication or synchronization between multiple user directories.
This is not a simple subject, but deserves some attention in this document.
There are many technical problems with password replication. Here are a few of the bigger examples:
There are a number of reasons that sites consider password replication/synchronization. Some are better implemented in other ways, thus avoiding many of the problems listed above.
Shared Directories Some people are under under the impression that "Password Synchronization" must occur between "applications", even if the "applications" share a common user directory. This is actually a trivial case, since the credentials are only stored once and can (usually, but not always) be shared between the two applications (presumably, one of the applications is SiteMinder). With SiteMinder's broad User Directory support, this case of "synchronization" is non-existent (or trivial, depending on how you look at it). This, of course, depends on whether the applications require their own operational user attributes or can share the "native" ones.
If the underlying system cannot be accessed through any other mechanism than SiteMinder, this synch is not needed, in fact. An alternate solution for this case is presented in the chapter on Best Practices for Storing Legacy/Back-End Credentials.
Since SiteMinder supports both Windows Domain Directories and Active Directory, this is better accomplished using a shared directory than by replication. iPlanet (and possibly others) also has a replicator available to perform password synchronization at the directory level.
This case is trivially solved using SiteMinder's Auth/AZ mapping. In fact, without such mapping, no single sign-on is possible, since when the user will authenticates against different directories, SiteMinder will consider them different users.
This case only occurs when two (or more) data stores are accessed independently, directly by the user and both are used for authentication.
In these cases, sites cannot get Single Sign-On (because of the different access controls), but they want each user to have a single set of credentials that they can use to log into each application. When the credentials change in one application, they should change in all others. Things like forced password change, password expiration, etc, should be enforced according to common (or at least negotiated) rules.
This is the only true Password Synchronization case and is actually quite rare. All of the other cases are better handled using other mechanisms.
Note: The two directories involved are often otherwise unrelated and no other provisioning is required.
Such replication is, however, still possible, even though it is not supported out of the box by APS. APS calls a specific function every time a user's password changes, passing the user identity and the new password. This function can be hooked to capture the change, and then the function can write the changes to any or all of the other places that it is needed.
This function is part of the SmAPSEx library (described on Unsupported "Page" Cross-Reference), but is not publicly available in the SDK (imagine the possibility of Trojan horses capturing password changes). However, it is available to CA Professional Services to provide custom solutions.
Copyright © 2014 CA.
All rights reserved.
|
|