In effect, a passtoken is a one-time or limited-time substitute for a user's password. A passtoken is associated with a user (and signon group) when it is created, and can only be used to sign on as that user.
If passtokens are enabled, they may be used for these purposes:
Not all ESM Modules support passtokens. If you are using a module that does not to verify users, then user identities will not be automatically transferred across security domains, and users will have to explicitly sign on with their normal credentials in each domain.
Consequently, ESF Manager can be configured to disallow the generation or use of passtokens, or both; this affects any security domain (ES server / region, or MFDS) using that security configuration. Also, ESM Modules that implement passtokens will often provide additional controls. For example, the MLDAP ESM Module lets you specify for each user whether that user can generate passtokens for itself, for any user, or not at all; and whether that user can be signed on using a passtoken.
=
value.You can restrict the use of passtokens in any ES component that uses a particular Security Manager configuration by setting the following in that area:
[Passtoken] allow=option
where option is one of none
(disable passtokens), generate
(allow passtoken generation but not use), signon
(allow passtoken use for signon but not generation), both
(allow both generation and signon), or yes
(synonym for both
).
Allowing only generation may be useful for a region that makes ISC requests to another region but does not receive them, and conversely allowing only signon may be useful for a region that receives remote requests but never makes them.
[Passtoken]
section of the "Custom Configuration" area to set some options for passtoken processing.
In that section, there are two settings you can use to change the secret key for the MAC verifier used in the passtokens the MLDAP ESM Module generates. You can set the key directly in the MFDS configuration with the Secret
keyword, or point the ESM Module to a file containing the secret key with the SecretFile
keyword.
Note that passtokens generated by the MLDAP ESM Module in one security domain will only be verifiable by another instance of the module in another domain if both are configured with the same secret key.
You can also use the Duration
keyword in that section to control how long passtokens remain valid after they are generated. (The default is one minute.) This should be long enough for the sending component to get the token to the receiving component, taking network delays into account, and for the receiving component to perform its Verify request; but making it too long gives an attacker more time to capture and replay a token, especially if it is being sent over an unsecured channel.
See MLDAP ESM Module Custom Configuration Information for more information.
microfocus-MFDS-User
class which control access to passtokens:
microfocus-MFDS-User-CreateToken
self:
The user can create normal passtokens (good only for that user).any:
The user can create surrogate passtokens for other users.microfocus-MFDS-User-UseToken
self:
The user can be signed in with a normal passtoken, but not a surrogate passtoken.any:
The user can be signed in with a normal or surrogate passtoken.
However, there is no danger of passtokens being abused in this configuration.
Disable passtokens in the ESF Manager configuration in each "Security Manager" object in the MFDS repository, using the MFDS administration GUI. See Passtoken Options for ESF Manager.
MFDS and ESMAC always use normal passtokens, so this feature can be enabled without enabling the more powerful (and riskier) surrogate tokens.
To enable passtokens for MFDS and ESMAC, do not disable passtoken support in your ESF Manager configuration (the "Custom Configuration" section of the "Security Manager") for MFDS or any ES region where you want this facility. Passtoken support is enabled in ESF Manager by default.
Also, you may have to perform ESM-specific actions to enable normal passtoken generation and signon for your administrative users. With the MLDAP ESM Module, for each administrative user who should be able to switch between ESMAC and MFDS transparently, set the following attributes in the LDAP repository:
microfocus-MFDS-User-CreateToken
to self
microfocus-MFDS-User-UseToken
to self
Note that you do not need to do this for system users (such as SYSAD
) unless you use them as administrator IDs. You only need to do it for user accounts that your administrators actually sign into MFDS or ESMAC with.
Note also that in its default configuration, MFDS does not require you to sign in. If you are not signed in, no passtoken will be generated when you switch to ESMAC. To use passtokens between MFDS and ESMAC, make sure you configure MFDS to require an administrative signon.
Note that passtokens are not supported for ISC conversations with non-ES regions, such as MFE or mainframe CICS.
ISC passtokens are surrogate passtokens generated automatically by the system as necessary. They are always generated by the region's system user, which is the user account used to start the region.
To enable ISC passtokens, do not disable passtoken support in your ESF Manager configuration (the "Custom Configuration" section of the "Security Manager") for MFDS or any ES region where you want this facility. Passtoken support is enabled in ESF Manager by default.
Also, you may have to perform ESM-specific actions to enable:
For the MLDAP ESM Module, that entails:
microfocus-MFDS-User-CreateToken
to any
microfocus-MFDS-User-UseToken
to any
If the regions use different LDAP repositories, note that the system user account (the one generating the token) belongs to the region that initiates the request, and the regular user account (which is signed on using the token) belongs to the region that processes the request.
Customers interested in using passtokens in their own applications should contact Micro Focus to discuss possible product enhancements and early-adopter programs.