03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Run-as Mapping<br />

A single user name and password for the<br />

mapped identity is stored in the<br />

deployment descriptor.<br />

Authentication done at installation time.<br />

Run-as mapping is performed using the<br />

<strong>WebSphere</strong> Administrative Console only.<br />

Cannot be modified after application<br />

installation.<br />

<strong>Security</strong> Role Mapping<br />

One or more user names and/or group<br />

names are stored in the deployment<br />

descriptor.<br />

Authentication done at runtime.<br />

<strong>Security</strong> role mapping is performed using<br />

the Application Assembly Tool, the<br />

<strong>WebSphere</strong> Studio, or the <strong>WebSphere</strong><br />

Administrative Console.<br />

Can be modified after application<br />

installation using the <strong>WebSphere</strong><br />

Administrative Console.<br />

When installing an application which defines either a bean-level or method-level<br />

run-as role delegation policy, one of the steps will be to map the Run-as role(s) to<br />

a real user, as shown in Figure 5-14.<br />

1. Select the Role that you wish to map.<br />

2. Enter a valid user name and password of a user in the registry that is a<br />

member of the specified security role.<br />

3. Click Apply to authenticate the user and associate that identity with the<br />

Run-as role policy.<br />

4. Once all Run-as roles have been mapped to real users, click Next to continue<br />

the installation.<br />

Figure 5-14 Run-as role mapping<br />

Chapter 5. Securing EJBs 93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!