03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

After running the client, you should see the messages from the different servers<br />

in your console. Check if you see the message from the PassThrough bean, and<br />

from the Bouncer bean, together with the caller user names.<br />

You can also turn on tracing for the <strong>WebSphere</strong> Application Servers then check<br />

the trace file and see what happened during the process.<br />

Scenario 2: BasicAuth, Identity Assertion and Client<br />

Certificates<br />

This scenario is the same as Scenario 1 except for the interaction from client<br />

Client02 to server Server02. Therefore, the configuration of Scenario 1 still<br />

needs to be in place, but we have to modify server Server02 slightly and add a<br />

configuration for client Client02. We will not be modifying the configuration for<br />

Client01 or Server01; follow the steps from “Scenario 1: BasicAuth and Identity<br />

Assertion” on page 110.<br />

invocation<br />

credential:<br />

user01<br />

user01<br />

identity assertion layer<br />

received<br />

credential:<br />

user01<br />

J<br />

user01/userpwd<br />

message layer<br />

SSL<br />

transport layer<br />

server01/serverpwd<br />

message layer<br />

SSL<br />

transport layer<br />

Client01<br />

Java client<br />

Server01<br />

EJB server<br />

Server02<br />

EJB server<br />

J<br />

SSL: cn="user01",o=itso<br />

transport layer<br />

Client02<br />

Java client<br />

Figure 6-5 Scenario 2: BasicAuth, Identity Assertion and Client certificates<br />

Chapter 6. Securing Java clients 113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!