03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Example 7-9 Topic default permissions<br />

<br />

<br />

<br />

+pub<br />

<br />

<br />

Keeping the element empty signifies that this configuration is the default<br />

topic configuration.<br />

7. To define permissions for a specific topic, we need to configure topic node in<br />

the XML file as follows:<br />

Example 7-10 Topic permissions<br />

<br />

ITSOTopic<br />

<br />

+pub<br />

<br />

<br />

tuser01<br />

+pub<br />

+sub><br />

<br />

<br />

8. Save and close the integral-jms-authorizations.xml file.<br />

<strong>Security</strong> for the <strong>WebSphere</strong> embedded JMS provider operates as part of<br />

<strong>WebSphere</strong> Application Server global security. This means that to enable<br />

Embedded JMS <strong>Security</strong>, we need to enable Global <strong>Security</strong> of the application<br />

server. When the security is enabled, all the JMS connections to the JMS<br />

provider are all authenticated and access to JMS resources owned by JMS<br />

provider are controlled by access authentications. Also, all JMS connections to<br />

JMS provider must provide a user name and password for authentication.<br />

We define this user name and password when we create a connection factory. In<br />

the administrative console, perform the following steps.<br />

1. Click Resources -> <strong>WebSphere</strong> JMS Provider.<br />

2. In Additional Properties, click <strong>WebSphere</strong> Queue Connection Factories.<br />

3. Click New. In this page of the Administrative Console, set the following fields:<br />

– Component-managed Authentication Alias: select an authentication alias<br />

entry for this field. If no alias is available, you need to create one.<br />

Chapter 7. Securing Enterprise Integration components 165

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!