![]() ![]() ![]() ![]() ![]() ![]() |
This document desscribes how to set an SSM instance’s logs to record debugging-level events having to do with authentication, role mapping, and authorization.
When policy outcomes are other than expected, it may be useful to enable policy debugging so that the SSM’s logs will capture all events related to policy decisions. The logged information may policy-related details, such as failed authentications, missing group memberships, incorrect role assignments, and others.
Caution: | SSM performance can be severely impacted when debug flags are enable. In production environments turn on debug flags only when necessary. |
Policy debugging is enabled by changing settings in the SSM instance’s log4j.properties
files. To do this:
config
directory, open log4j.properties
in an editor.
log4j.logger.com.bea.security.providers.authentication = DEBUG
log4j.logger.com.bea.security.providers.rolemapper = DEBUG
log4j.logger.com.bea.security.providers.authorization = DEBUG
log4j.logger.com.wles.util.DebugStore=DEBUG
This section describes common policy-related events that may be captured when in debugging mode.
For authentication events, check for the events shown in Table 10-1:
For role mapping events, check for the events shown in Table 10-2:
For authorization events, check for the events shown in Table 10-3:
========== Policy Evaluation Info ==========
RequestResource is: //app/policy/<resource>
UserInfo:
Name: //user/<identity-directory>/<user-name>
Groups: //sgrp/<identity-directory>/<group-name>
Resource Present: true
Roles Granted: //role/<granted-roles>
Role Mapping Policies:
1. Result: true; Policy Type: grant
Role: //role/<requested-role>
Resource: //app/policy/<resource>
Subject: //user/<identity-directory>/<user-name>
Constraints: (some-variable = "some-value")
Evaluated Attributes and Functions:
some-variable(identity) = some-value
ATZ Policies:
1. Result: true; Policy Type: grant
Privilege: //priv/<requested-privilege>
Resource: //app/policy/<resource>
Subject: //role/<granted-role>
Constraints: NONE
========== Policy Evaluation Info ==========
The following 2 API calls are specific to Java-SSM only. To enable policy debugging, open BEA_HOME/ales30-ssm/java-ssm/<
instancename
>/jssm/config/WLESarme.properties
in an editor and set the following:
Note: | Enabling debugging weakens security, because OES policy evaluations will be visible to Java programs. For example, a malicious Java program could make "_Debug()" calls to gain information about policies. |
DebugInfo debugInfo = new DebugInfo();
getRoles_Debug(AuthenticIdentity ident, RuntimeResource resource, RuntimeAction action, AppContext context, DebugInfo debugInfo)
isAccessAllowed_Debug(AuthenticIdentity ident, RuntimeResource resource, RuntimeAction action, AppContext context, DebugInfo debugInfo)
For further information, see the sample provided in the BEA_Home/ales32-ssm/java-ssm/examples/JavaAPIExample
directory.
![]() ![]() ![]() |