03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Client01<br />

Java client<br />

J<br />

Server01<br />

EJB server<br />

Server02<br />

EJB server<br />

Figure 6-3 Test environment for Identity Assertion<br />

Scenario 1: BasicAuth and Identity Assertion<br />

This is an example of a pure Java client, Client01, accessing a secure EJB on<br />

Server01 via user "user01". The EJB code on Server01 accesses another EJB<br />

on Server02. This configuration uses Identity Assertion to propagate the identity<br />

of "user01" to the downstream server Server02. Server02 will trust that "user01"<br />

has already been authenticated by Server01 because it trusts Server01. To gain<br />

this trust, the identity of Server01 also flows to Server02 simultaneously and<br />

Server02 will validate the identity by checking the trustedPrincipalList to ensure it<br />

is a valid server principal. Server02 also authenticates Server01.<br />

invocation<br />

credential:<br />

user01<br />

user01<br />

identity assertion layer<br />

received<br />

credential:<br />

user01<br />

J<br />

user01/userpwd<br />

message layer<br />

SSL<br />

transport layer<br />

server01/serverpwd<br />

message layer<br />

SSL<br />

transport layer<br />

Client01<br />

Java client<br />

Server01<br />

EJB server<br />

Server02<br />

EJB server<br />

Figure 6-4 Scenario 1: BasicAuth and Identity Assertion<br />

The following section shows the steps for configuring Client01, Server1 and<br />

Server2.<br />

110 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!