03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 5-13 Selecting methods for the methods permission in <strong>WebSphere</strong> Studio<br />

10.Click Finish when done.<br />

5.6 Run-as mapping<br />

Run-as mapping refers to the process of assigning a real user from the user<br />

registry that is a member of the specified security role to the bean-level or<br />

method-level delegation policies. Run-as mapping is very different from, but<br />

easily confused with, security role mapping. The following table compares these<br />

two concepts.<br />

Table 5-1 Run-as Mapping versus <strong>Security</strong> Role Mapping<br />

Run-as Mapping<br />

Run-as mapping is used to determine the<br />

principal from the user registry that will be<br />

used as the caller identity when a<br />

delegated EJB makes calls.<br />

Run-as mapping associates a single user<br />

that is a member of the specified security<br />

role with a delegation policy<br />

<strong>Security</strong> Role Mapping<br />

<strong>Security</strong> role mapping is used to<br />

determine the users and groups from the<br />

user registry that will be considered<br />

members of the security role.<br />

<strong>Security</strong> role mapping associates one or<br />

more users or groups with a security role.<br />

92 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!