Hi Magnus,
I guess that setting the client_identifier config in the WebSEAL config file to the default of "client-identifier =" (so empty) will instruct WebSEAL not to include such credential attribute and so no verification will be done.
Next is to get the IP address in the credential. In my testenvironment I see a credential attribute AZN_CRED_NETWORK_ADDRESS_STR[0] which contains the originating IP address.
Try playing around with use_real_ip_address parameter which is documented here:
https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.6/com.ibm.isam.doc/wrp_stza_ref/reference/ref_xacml_use_real_client_ip.html(You may have to look at using the AAC's AuthSvcCredential mapping rule to get things done, but that's only valid when you use the AAC's authentication service.)
Let me know if you're making progress.
Kind regards, Peter.
------------------------------
Peter Volckaert
Senior Sales Engineer
Authentication and Access
IBM Security
------------------------------
Original Message:
Sent: Thu May 23, 2019 03:12 AM
From: Magnus
Subject: ISAM - Stale session cookie
Hello,
Thanks for all replies.
We have been able to pinpoint the issue, the issue was related to the session cookie but the issue was not the session cookie itself. We are using the client_identifier in order to fetch the clients source ip from the loadbalancer. As the identifier is added to the session the user will be prompted by a forbidden if the users lease expire and they get an new ip from the dhcp.
Do anyone know if you can remove the enforcement of the client_identifier so that you can use it but it isnt enforced? We are using this attribute in an access policy to enforce an ip restriction for a federation. Other attributes that we could use is populated by the loadbalancer so the real source IP can only be resolved by using this in the WRP unfortunately.
Best regards
Magnus
------------------------------
Magnus
Original Message:
Sent: Wed May 22, 2019 01:25 PM
From: Jon Harry
Subject: ISAM - Stale session cookie
Hi Sylvain,
Usually when a seemingly sensible default is not set, it's because the capability was introduced at some point and the default was not to do the new (perhaps better) thing in order to avoid backward-compatibility issues.
Perhaps if you are using DSC you might not want to clear cookie because it's still potentially in use at another WebSEAL - but maybe with DSC on this option doesn't clear cookie anyway. I'm not sure.
Jon.
------------------------------
Jon Harry
Consulting IT Security Specialist
IBM
Original Message:
Sent: Wed May 22, 2019 01:14 PM
From: Sylvain Gilbert
Subject: ISAM - Stale session cookie
Hi Jon
I am curious to know why this setting could not be set by default to "yes" in ISAM.
Why would one want stale session cookie to remain in user's browser after logout?
I know that you already mentioned in some other post that WebSEAL will still consider the session cookie stale if it is presented again, but why not make this clearer by always instructing the browsers to clear stale session cookie?
Maybe for some specific use cases, this is not desirable?
Cheers
Sylvain
Original Message------
There's also a config option in Reverse Proxy which will perform a Set-Cookie to remove the session cookie on logout:
logout-remove-cookie = yes
This only works when the user actively logs out (/pkmslogout) rather than timing out but might be worth a try.
Jon.
------------------------------
Jon Harry
Consulting IT Security Specialist
IBM
------------------------------