03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

J2EE Connector architecture establishes contracts amongst the application, the<br />

resource adapter and the application server, where the application will eventually<br />

be deployed. These contracts imply that all the participating components are<br />

J2EE Connector architecture compliant for the sake of working together. The<br />

application contract is nothing more than the definition for the communication<br />

between connector and the application.<br />

The system contract defines the connection management, transaction<br />

management and the security management.<br />

Application<br />

Application<br />

Contract<br />

Connector<br />

or Resource<br />

Adapter<br />

EIS-specific<br />

interface<br />

Enterprise<br />

Information<br />

System (EIS)<br />

Container<br />

contract<br />

System contract<br />

-Connection<br />

management<br />

-Transaction<br />

management<br />

-<strong>Security</strong> management<br />

Application Server<br />

Connection<br />

Manager<br />

Transaction<br />

Manager<br />

<strong>Security</strong><br />

Manager<br />

Figure 7-27 J2EE Connector architecture<br />

The security contract enables the application server to connect to an Enterprise<br />

Information System using security properties. The application server<br />

authenticates with the EIS system by using the security properties the user<br />

credentials.<br />

There are two different methods the application server can authenticate to an<br />

Enterprise Information System.<br />

► Container-managed sign-on: the security properties are configured when<br />

the resource adapter is deployed on the application server. Again there are<br />

several ways to configure security properties here. With Configured Identity<br />

all resource adapter connections use the same identity when connecting to<br />

the Enterprise Information System. With Principal Mapping the principal<br />

used when connecting to the Enterprise Information System based on a<br />

combination of the current principal in the application server and the mapping.<br />

With Caller Impersonation the principal used in the Enterprise Information<br />

170 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!