03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

If one or more method-level delegation policies specify the Run-as system, one<br />

of the installation steps will be to verify this policy. The dialog appears as in<br />

Figure 5-15, and for each method that specifies the Run-as system, the<br />

application deployer can do one of the following:<br />

► Do nothing, and allow the method to make calls using the system identity.<br />

► Assign the method a Run-as role, and map the role to a user from the registry.<br />

Figure 5-15 Verifying the Run-as system<br />

To override the Run-as system mapping and assign a Run-as role, do the<br />

following:<br />

1. Select the methods to which you want to assign the Run-as role.<br />

2. Select the desired Role from the drop-down list of defined security roles.<br />

3. Enter the valid user name and password of a user in the registry that is a<br />

member of the specified security role.<br />

4. Click Apply to authenticate the user and associate that identity with the<br />

run-as role policy.<br />

5. Click Next to continue with the installation.<br />

94 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!