IBM Verify

IBM Verify

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only
  • 1.  JWT Generation Fails on ISAM/ISVA 10.0.6.0 via Junction – No JWT in Response (WebSEAL + Module Chain Config)

    Posted 25 days ago

    Hello everyone,
    we are working on configuring JWT generation on IBM Security Verify Access (ISAM/ISVA) using a WebSEAL junction with a Token Module Chain. However, despite following the documentation and creating the junction properly, the JWT token does not seem to be generated or returned in the response.

    Here are the detailed configurations and steps we performed:

    Module Chain Configuration:

    • Name: MODULECHAIN

    • Template: MODULECHAIN_TEMPLATE

    • Request Type: Issue

    • URI: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue

    • Lookup Type: Traditional WS-Trust Elements

    • Applies To Address: http://appliesto/JWTjunction

    • Issuer Address: nameoftheissuer

    • Modules Used (under Template Contents):

      1. Default IVCred Token

        • Mode: Validate

        • Signature Validation: Disabled (unchecked)

      2. Default JWT Module

        • Mode: Issue

        • JWT Signing Algorithm: none

        • No signing key provided.

    WebSEAL Junction Configuration (created via CLI):

    We created the junction with the following commands on both WebSEAL nodes:
    1) server task websealinstance1 create -f -t tcp -h hostreceivingJWT -p 30080 -v hostreceivingJWT:30080 -c iv_user,iv_groups -x -r -Y /JWTjunction
    2) server task websealinstance2 create -f -t tcp -h hostreceivingJWT-p 30080 -v hostreceivingJWT:30080 -c iv_user,iv_groups -x -r -Y /JWTjunction

    Webseal Stanza Configuration Snippet:

    [tfimsso:/JWTjunction]
    token-type = urn:ietf:params:oauth:token-type:jwt
    applies-to = http://appliesto/JWTjunction
    renewal-window = 15
    preserve-xml-token = false
    always-send-tokens = true
    tfim-cluster-name = my-cluster
    one-time-token = false
    token-collection-size = 1
    token-transmit-type = header
    token-transmit-name = jwt

    WebSEAL ACL & POP:

    • ACL: Set to FREE (for unauthenticated access).

    • POP attached: Our configured POP.

    • Object modify permissions: Set correctly.

    Logs:

    • The request appears in pdweb.debug (level 9 tracing enabled).

    • No JWT token appears to be generated.

    • No clear JWT-related traces seen.

    • Request log shows 302 redirect or returns the authentication page.

    • We're currently testing with Postman (sending a POST request to the junction /JWTjunction via the load balancer, which balances to the 2 Webseal nodes), wih a No-Auth Type request.

    Postman Result:

    • The response is a standard authentication page.

    • No JWT returned in response body or headers.

    Our Key Questions:

    1. We are already pointing to a real backend host (as shown in the junction configuration); however, no JWT token seems to be generated or returned in the logs or responses. Is there anything specific required on the backend side (such as specific HTTP response behavior) to trigger JWT issuance?

    2. Should the JWT be generated even for unauthenticated requests, since the ACL is set to FREE and we removed the Attribute Mapping Module?

    3. Is the presence of a backend response mandatory for JWT generation, or should the WebSEAL itself generate the JWT before forwarding the request?

    4. Are there any additional hidden conditions for JWT token issuance in ISVA / ISAM that we may have missed?

    Our Testing Objective:

    We want to test JWT generation before setting up the backend, to confirm that the JWT module chain is working correctly, even if the backend is not yet ready.

    Thanks a lot to everyone who can help us solve this first crucial step in the generation of the JWT.



    ------------------------------
    Lorenzo Coccia
    ------------------------------


  • 2.  RE: JWT Generation Fails on ISAM/ISVA 10.0.6.0 via Junction – No JWT in Response (WebSEAL + Module Chain Config)

    Posted 25 days ago

    Hello Lorenzo,

    The intention behind JWT Junction functionality is to inject JWT into the request going to the junction server. It never returns a JWT in the response. So if you're trying to generate and issue a JWT to the client then this is not the correct way to acquire a JWT.



    ------------------------------
    JACK YARBOROUGH
    ------------------------------



  • 3.  RE: JWT Generation Fails on ISAM/ISVA 10.0.6.0 via Junction – No JWT in Response (WebSEAL + Module Chain Config)

    Posted 14 days ago
    Edited by Lorenzo Coccia 14 days ago

    Hi Jack, 

    Thanks a lot for your support. So, is it correct that within the pdweb.debug logs the JWT does not appear? Is there any way, from our side (ISAM), to check if the token is correctly generated, or is this only possible through the application logs (the application receiving the JWT)?
    What is the correct way to generate the JWT in order for the application to receive it correctly?

    Thanks again



    ------------------------------
    Lorenzo Coccia
    ------------------------------