This is an IBM Automation portal for Cloud Platform products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
Adding to this discussion and consideration - TWAS-I-80; along with the one being discussed and considerable impact based on this.
TWAS-I-300. Missing source IP in SMF record type 80 when accessing with WAS or IHS
Although WebSphere does not provide the ability to map using the SAN in our configuration, we provide the ability for users to implement their own UserMapping class to map certificates in whatever way is necessary (using the SAN, or any other field that is desired).
See the documentation for the UserMapping interface, here --> https://www.ibm.com/docs/en/ibm-http-server/8.5.5?topic=SSEQTJ_8.5.5/com.ibm.websphere.javadoc.doc/web/spidocs/com/ibm/websphere/security/package-summary.html
It is also imperative to have the capability to filter down to a substring of the read certificate attribute if necessary as what is stored on the cert may have additional characters relative to the repository attribute that it needs to be matched to. For example my repository may store a PIV in a attribute as 0123456789012345, however, on the card it may be stored in the SAN UPN as 0123456789012345@domain. Thus we need the ability to match to only the first 16 characters of the SAN UPN off the cert.
Weve encountered the same when trying to match the subjectCN to repository attributes except in that case we only wanted to pull the last 10 characters off the subjectCN. The ability to take substrings of certificate attributes is critical in bridging the gap due to the independent management of user repositories and user certificates. Having the capability will provide robust mapping abilities and should be sufficient to bridge the gap in most instances.
I agree that this RFE is CRITICAL for use of websphere with government agencies as they are being mandated to move to PIV authentication. This necessitates the need to be able to filter against the UPN in the SAN of the certificate.