03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►<br />

►<br />

►<br />

►<br />

►<br />

Operating system security should be considered in order to protect sensitive<br />

<strong>WebSphere</strong> configuration files and to authenticate users when operating<br />

system user registry is used for authentication. This is extremely important in<br />

a distributed <strong>WebSphere</strong> environment when potentially different operating<br />

systems and different user registries might be involved. Keeping the users<br />

(and their passwords) and groups in sync across many different machines<br />

might be a problematic administration task.<br />

Standard Java security is provided through the Java Virtual Machine (JVM)<br />

used by <strong>WebSphere</strong> and the Java security classes.<br />

Java 2 security enhances standard Java Virtual Machine security by<br />

introducing fine grained access, easily configurable security policy, extensible<br />

access control structure and security checks for all Java programs (including<br />

applets).<br />

Common Secure Interoperability protocol adds additional security features<br />

that enable interoperable authentication, delegation and privileges in CORBA<br />

environment. It supports interoperability with EJB 2.0 specification and can be<br />

used with SSL.<br />

J2EE security uses the security collaborator to enforce J2EE-based security<br />

policies and support J2EE security APIs. APIs are accessed from <strong>WebSphere</strong><br />

applications in order to access security mechanisms and implement security<br />

policies.<br />

<strong>WebSphere</strong> Application Server V5 security relies and enhances all the above<br />

mentioned layers. It implements security policy for in unified manner for both<br />

Web and EJB resources.<br />

9.1.2 <strong>WebSphere</strong> security in a distributed environment<br />

In a distributed environment, <strong>WebSphere</strong> Application Server may be installed in<br />

the Network Deployment configuration, where <strong>WebSphere</strong> creates a network of<br />

application servers instances supporting clustering, caching and the efficient<br />

utilization of shared resources. Figure 9-2 presents a general architecture of the<br />

<strong>WebSphere</strong> deployment configuration.<br />

Chapter 9. <strong>WebSphere</strong> Application Server security 217

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!