03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Available functions<br />

ActiveX<br />

client<br />

Applet<br />

client<br />

J2EE<br />

client<br />

Pluggabl<br />

e client<br />

Thin<br />

client<br />

Enables initialization of<br />

client app’s runtime<br />

environment<br />

Supports<br />

authentication to local<br />

resources<br />

Requires app is<br />

distributed to client<br />

machine<br />

No No Yes No No<br />

No No Yes No No<br />

No No Yes Yes Yes<br />

This chapter will concentrate on securing the J2EE application client and thin<br />

application client.<br />

6.2 CSIv2 and SAS<br />

The Common Secure Interoperability (CSI) security specification is defined by<br />

the OMG (see http://www.omg.org). Currently in its second version, the<br />

specification defines the <strong>Security</strong> Attribute Service (SAS) protocol to address the<br />

requirements of CORBA security for interoperable authentication, delegation and<br />

privileges. The SAS protocol is designed to exchange its protocol elements in the<br />

service context of GIOP request and reply messages that are communicated<br />

over a connection-based transport. The protocol is intended to be used in<br />

environments where transport layer security, such as that available via Secure<br />

Sockets Layer (SSL)/ Transport Layer <strong>Security</strong> (TLS) or Secure InterORB<br />

Protocol (SECIOP), is used to provide message protection (that is, integrity and<br />

or confidentiality) and server-to-client authentication. The protocol provides client<br />

authentication, delegation, and privilege functionality that may be applied to<br />

overcome corresponding deficiencies in an underlying transport. The SAS<br />

protocol facilitates interoperability by serving as the higher-level protocol under<br />

which secure transports may be unified.<br />

The SAS protocol is divided into two layers:<br />

► The authentication layer is used to perform client authentication where<br />

sufficient authentication could not be accomplished in the transport.<br />

► The attribute layer may be used by a client to deliver security attributes, such<br />

as identity and privilege, to a target where they may be applied in access<br />

control decisions.<br />

100 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!