03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Message channels and MQ channels can use the SSL protocol to provide link<br />

level security. A caller MCA is an SSL client and a responder MCA is an SSL<br />

server. You can specify the cryptographic algorithms that are used by the SSL<br />

protocol as part of the channel definition.<br />

At each end of a message channel, and at the server end of an MQ channel, the<br />

MCA acts on behalf of the queue manager to which it is concerned. During the<br />

SSL handshake, the MCA sends the digital certificate of the queue manager to<br />

its partner MCA at the other end of the channel. The MCA at the client end of an<br />

MQI channel acts on behalf of the user of the <strong>WebSphere</strong> MQ client application.<br />

During the SSL handshake, the MCA sends the user’s digital certificate to its<br />

partner MCA at the server end of the MQ channel.<br />

Digital certificates are stored in a key repository. The queue manager attribute<br />

SSLKeyRepository specifies the location of the key repository that holds the<br />

queue manager’s digital certificate. On a <strong>WebSphere</strong> MQ client system, the<br />

MQSSLKEYR environment variable specifies the location of the key repository<br />

that holds the user’s digital certificate. Alternatively, a <strong>WebSphere</strong> MQ client<br />

application can specify its location in the KeyRepository field of the SSL<br />

configuration options structure, MQSCO, for an MQCONNX call.<br />

To create your own certificates for the SSL communication, use <strong>IBM</strong>’s ikeyman<br />

tool.<br />

7.3 J2C security<br />

This section briefly describes the J2EE Connector Architecture in <strong>WebSphere</strong><br />

Application Server V5 and the security considerations related to connectors.<br />

When using connectors, the application requests data from the connector and<br />

the connector gets the data from the resource and returns it to the application.<br />

But Enterprise Information Systems are generally very important applications<br />

and are protected from unauthorized access. So authentication information must<br />

be passed while requesting a connection.<br />

7.3.1 Securing adapters<br />

Connectors in <strong>WebSphere</strong> let you connect to resources such as data or an<br />

application on a remote server. These resources are called an “Enterprise<br />

Information System” (EIS). Typically, a connector accesses non-relational data<br />

and is used by developers to developers to complement the other means of<br />

accessing Relational DataBase Management Systems (RDBMS) data. Basically,<br />

your application request reaches the connector, the connector talks to the EIS,<br />

then returns the results back to the requestor application.<br />

Chapter 7. Securing Enterprise Integration components 169

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!