-
Notifications
You must be signed in to change notification settings - Fork 604
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support LTPA rotation without requiring planned outage #18499
Comments
Meeting notes:
This needs further discussion to be taken offline with updates to the cloud considerations page.
|
@utle I'm thinking about the steps a user would have to go through to get an application deployed to multiple servers updated with new LTPA keys without taking a login outage (i.e. LTPA tokens are issued that a server cannot access). At a high level I think the steps are fairly simple, but I'm not sure of the detail and the UFO doesn't include it. I'm worried that the steps are overly burdensome. I think they would be:
I worry going from 4 to 5 would require significant updates to the server.xml since it would involve updating the primary and deleting an entry from the validationKeys. Do you agree that these are the steps? If so we should document the process in the UFO, however I'm concerned that flow is quite complicated for users to script around and perhaps we need to simplify the externals here. |
@NottyCode Option 2: Enable monitorDirectory; Primary and validation keys must be in the same directory.
Added pg22 and pg 23 in the UFO with these two options. |
@OpenLiberty/demo-approvers Demo scheduled for EOI 23.16 |
Product Code delivered: #25826 |
FAT test code delivered: #26017 |
SVT: Issue 30215 |
@OpenLiberty/serviceability-approvers - See the completed questions below. Please let me know if serviceability approval can be granted or if anything else is needed.
a) What problem paths were tested and demonstrated?
b) Who did you demo to?
|
@OpenLiberty/ste-approvers the STE slides have been uploaded to the STE Box Folder |
@Zech-Hein : WASSEC L2 reviewed STE slides and they good good. Thanks. |
ID has received initial content for this feature at OpenLiberty/docs#6821 and written a draft. Approving. |
UpdateTrigger being added per Alasdair's request: #26731 |
Beta guards are removed: #27009 |
In this pull request we are working to add the `audit-2.0` feature. This feature is very similar to audit-1.0 feature the main difference is that it doesn't involve rest handler features. More information about this feature can be found here: OpenLiberty#18499
In this pull request we are working to add the `audit-2.0` feature. This feature is very similar to audit-1.0 feature the main difference is that it doesn't involve rest handler features. More information about this feature can be found here: OpenLiberty#18499
In this pull request we are working to add the `audit-2.0` feature. This feature is very similar to audit-1.0 feature the main difference is that it doesn't involve rest handler features. More information about this feature can be found here: OpenLiberty#18499
In this pull request we are working to add the `audit-2.0` feature. This feature is very similar to audit-1.0 feature the main difference is that it doesn't involve rest handler features. More information about this feature can be found here: OpenLiberty#18499
In this pull request we are working to add the `audit-2.0` feature. This feature is very similar to audit-1.0 feature the main difference is that it doesn't involve rest handler features. More information about this feature can be found here: OpenLiberty#18499
Description of the high level feature, including any external spec links:
Idea: make Liberty feature parity with traditional WAS to allow LtpaToken key rotation without having to restart the Liberty profile.
LtpaToken SSO key rotation in Liberty currently requires a planned outage, unlike traditional WAS which can rotate the key on the fly. The traditional WAS administrative console setting controls for automatic key re-generation filled a function in high-security sites to make mounting a session attack prohibitively costly. The feature created a new key without requiring any administrator intervention, nor restarting of WAS profiles.
There is no way to re-generate the LTPA keys on-demand without a Liberty profile restart so it can be automated out-of-band of Liberty; and even that procedure is not shown in the product documentation as far as I can tell.
Thus, using third-party information sources and not the product documentation, as best as I can tell the only way to implement a high-security configuration with Liberty profiles without interrupting the application is only under applications like IBM Workload Scheduler that support session persistence. We would have to architect a load-balancer-fronted multiple-master configuration that fails over to a standby, transparently carrying sessions with it, drop the target master from the load balancer rotation, shut down the profile, force the password change of the LTPA key, start up the profile which generates a new LTPA key, and then return the node to the load balancer rotation. That's a big increase in operational complexity to rotate the LTPA key with the same no-restart functionality as traditional WAS.
When complete & mandatory, add links to the UFO (Upcoming Feature Overview) document, FTS (Feature Test Summary), blogs post issues(s), and Aha (externally raised RFEs):
List of Steps to complete or get approvals / sign-offs for Onboarding to the Liberty release (GM date)
Instructions:
Design
Before Development Starts or 8 weeks before Onboarding
Before proceeding to any items below (active development), this feature MUST be prioritized on the backlog, and have been socialized (e.g., UFO Review). Follow the Feature and UFO Approval Process.
Development
When active development has begun
Beta
In order to facilitate early feedback from users, all new features and functionality should first be released as part of a beta release.
Beta Code
kind=beta
,ibm:beta
,ProductInfo.getBetaEdition()
target:beta
and the appropriatetarget:YY00X-beta
(where YY00X is the targeted beta version).release:YY00X-beta
(where YY00X is the first beta version that included the functionality).Beta Blog (Complete 1.5 weeks before beta eGA)
Legal
3 weeks before Onboarding
Translation
3 weeks before Onboarding
Feature Complete
2 weeks before Onboarding
Focal Point Approvals
2 to 1 week before Onboarding
You MUST have the Design Approved or No Design Approved label before requesting focal point approvals.
All features (both "Design Approved" and "No Design Approved")
"Design Approved" features
Ready for GA
1 week before Onboarding
1 week before GA
Other deliverbles
The text was updated successfully, but these errors were encountered: