03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

To call a piece of trusted code to temporarily enable access to more resources<br />

than are available directly to the application the doPrivileged method can be<br />

used. It comes handy when for example an application wants to ........<br />

The domains, either system or application, can also implement additional<br />

protection of their internal resources within the domain boundary.<br />

<strong>Security</strong> management<br />

The security manager defines the outer boundaries of the Java sandbox. The<br />

fact that the security manager is customizable, it allows the security manager to<br />

establilish custom security policies for an application. The concrete<br />

<strong>Security</strong>Manager provided with the Java version 1.2 allows you to define your<br />

custom policy not in Java code, but in an ASCII file called the policy file.<br />

The security manager is not automatically loaded when an application is running,<br />

in order to activate the manager, the user has to specify the<br />

-Djava.security.manager command-line argument for the Java runtime.<br />

A custom security manager class can be also specified in the command-line:<br />

-Djava.security.manager=com.mycompany.My<strong>Security</strong>Manager; if nothing is<br />

specified then the default security manager will be initialized for the application.<br />

Access control<br />

The java.security.ProtectionDomain class represents a unit of protection within a<br />

Java application environment and is typically associated with a concept of<br />

principal.<br />

The java.security.AccessController class is used for the following purposes:<br />

► To decide whether an access to a critical resource is allowed or denied,<br />

based on the security policy currently in effect,<br />

► To mark code as being privileged,<br />

► To obtain a snapshot of the current calling context to support access-control<br />

decisions from a different context.<br />

Any code that controls access to system resources sould invoke<br />

AccessControler methods if it wishes to use the specific security model and<br />

access control algorithm utilized by these methods.<br />

<strong>Security</strong> permissions<br />

The permission classes represent access to system resources. The<br />

java.security.Permission class is an abstract class and is subclassed to<br />

represent specific accesses.<br />

198 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!