IBM Maximo Application Suite is a powerful platform for asset management, and when deploying Maximo in your organization, security should always be a top priority. A key element of security is choosing the right authentication mechanism for your Maximo instance. Maximo supports several types of authentication, and the best choice depends on your organization’s needs, infrastructure, and security policies. In this blog, we will explore the types of authentication available in Maximo, their advantages and disadvantages, and helpful tips for administrators.
Maximo offers multiple authentication methods that can be configured according to your enterprise's security model. The three supported authentication types in Maximo are:
Let's take a deep dive into each one.
Maximo Native Authentication is the default authentication method where user credentials are stored directly within Maximo’s database. When logging in, users provide their username and password directly to Maximo and the system validates them against the encrypted value in the Maximo database.
LDAP (Lightweight Directory Access Protocol) is a widely used authentication method that integrates Maximo with external directory services such as Microsoft Active Directory or Open LDAP. With LDAP, Maximo delegates user authentication to an external service rather than managing users locally. When logging in, users provide their username and password directly to Maximo, and the system validates against the external directory service.
SAML (Security Assertion Markup Language) is an XML-based open standard for transferring identity data. SAML allows for federated authentication, meaning that Maximo can delegate authentication to a third-party identity provider (IdP), such as Okta or Azure Active Directory. Once authenticated, the IdP sends a signed SAML assertion to Maximo, which grants the user access. When logging in, users are redirected to the IdP to authenticate, and once authenticated, they are directed back to Maximo as an authenticated user.
Selecting the right authentication method depends on your organization’s needs and infrastructure. Here are a few guidelines to help you choose:
Maximo admins should always prioritize secure and efficient user management practices. When choosing the authentication method, be sure to plan for scalability, security, and ease of maintenance. By carefully selecting the appropriate authentication method and properly configuring it, you can ensure a secure and seamless user experience for all Maximo users.
MAS allows administrators to mix and match authentication sources at a user-by-user level. First, you must configure the authentication sources, and then you can enable or disable which authentication method each user can use when creating or editing the user record.
MAS allows a default login behavior to be selected. This configuration is accessed in the User application in MAS on the Authentication tab. From here, you can control the authentication method that is available on the top of the login screen. If you are using SAML, you can also have the users routed to the default identity provider to authentication rather than the suite login page. If you do configure the seamless login, be sure to note the dedicated routes for any other authentication methods you might want to use. This will be key if you ever need to use a non-SAML authentication method.
Example Local Dedicated Route: https://auth.demo.maximo.app/idplogin/loginpage?idp=local
Link to IBM Documentation: https://www.ibm.com/docs/en/masv-and-l/continuous-delivery?topic=authentication-streamlined-login
When using SAML in MAS, you might want to extend your http session timeout and ltpa expiration. Putting together two IBM articles has proven to be a recipe for success.
Addthese to your user interface server bundle additional properties:
<httpSession cookieName="JSESSIONIDUI" cookieSecure="true"
invalidateOnUnauthorizedSessionRequestException="true" invalidationTimeout="12h"
cookieSameSite="Lax"/>
<ltpa expiration="480" />
Link to IBM Documentation:
https://www.ibm.com/support/pages/node/7116228
https://www.ibm.com/support/pages/updating-ltpa-timeout-manage