03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►<br />

Messages sent and received can participate in distributed transactions.<br />

The JMS specifications do not discuss the security and encryption of the<br />

message that is getting transferred using the JMS provider. Instead,<br />

specifications leave the security implementation to the JMS provider. We are<br />

going to discuss <strong>WebSphere</strong> MQ as a JMS provider.<br />

<strong>Security</strong> services<br />

This section will investigate the five security services for messaging.<br />

►<br />

►<br />

►<br />

Authentication is a mechanism used to check whether the application or the<br />

user is genuine or not. In a <strong>WebSphere</strong> MQ context, when a message<br />

channel starts, it is possible for the message channel agent (MCA) at each<br />

end of the channel to authenticate its partner, known as mutual<br />

authentication. For the sending MCA, this provides assurance that the<br />

partner it is about to send messages to is genuine. And for the receiving<br />

MCA, there is a similar assurance that it is about to receive messages from a<br />

genuine partner.<br />

The application that handles the messaging has to perform the<br />

authentication; for example: when a servlet sends a message <strong>WebSphere</strong><br />

has to authenticate the user if he/she can run the servlet. Since there is no<br />

message level security (who can send what type of message) message level<br />

should be considered during application design.<br />

Authorization for the <strong>WebSphere</strong> MQ objects is stored in MQ (actually in a<br />

special queue). <strong>WebSphere</strong> MQ uses normal operating system user name<br />

and group authorizations to protect <strong>WebSphere</strong> MQ applications and<br />

<strong>WebSphere</strong> MQ Administration.<br />

Access Control (ACL) can be defined for each object. This Access Control<br />

service protects critical resources in a system by limiting access only to<br />

authorized users and their applications. It prevents the unauthorized user of<br />

an object. For example, you can define Access Control so that it only allows<br />

that particular application to connect to a queue manager if the user ID<br />

associated with the application is authorized to do so.<br />

Confidentiality: many times you will need to protect the message from<br />

unauthorized disclosure and you do not want to ignore the message content<br />

confidentiality when the message is travelling over an insecure network such<br />

as the Internet. In such cases, there is no help that we can get from Access<br />

Control definitions. What we need here is message encryption. For example,<br />

after sending the message MCA gets it from the transmission queue, the<br />

message is encrypted before it is sent over the network to the receiving MCA.<br />

At the other end of the channel, the message is decrypted before the<br />

receiving MCA puts it on its destination queue.<br />

160 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!