03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

8.6.1 Implementing security with JAAS<br />

This section will explain how JAAS is generally used to implement security in<br />

Java.<br />

Note: JAAS does not require Java 2 security to be enabled. JAAS can be<br />

configured and used without Java 2 security.<br />

Secured application<br />

Concerning security, here we will investigate how it works within an application.<br />

The secured application has two parts:<br />

►<br />

►<br />

The main application that handles the login procedure and runs the secured<br />

code under the authenticated subject.<br />

The action that is invoked from the main application under a specific subject.<br />

Supporting Components<br />

The following objects are required for a secured application using JAAS:<br />

►<br />

►<br />

Principal that is part of a Subject.<br />

First of all, the Subject has to be explained. In JAAS the Subject is some<br />

identity. This identity will be authenticated and permissions will be assigned to<br />

it.<br />

A Subject can have a relationship with several different authorities. In JAAS,<br />

these multiple interactions with authorities are represented by objects that are<br />

implementing the java.security.Principal interface. The principal objects are<br />

listed under a subject.<br />

A callback handler that implements the CallbackHandler interface. This class<br />

is a client provided set of interfaces for entering authentication information.<br />

These interfaces decouple the service provider from the particular input<br />

devices being used.<br />

Definition: callback<br />

Developers conversant in the event-driven programming model of<br />

Microsoft Windows and X Window are accustomed to passing function<br />

pointers that are invoked when something happens. The invocation part of<br />

the process is the “callback”. However, Java does not support method<br />

pointers; Java interfaces provide a solution to implement callbacks.<br />

Chapter 8. Programmatic security 205

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!