03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

9.2.1 Extensible security architecture model<br />

The diagram below presents general view of the logical layered security<br />

architecture model of <strong>WebSphere</strong> Application Server <strong>V5.0</strong>.<br />

The flexibility of that architecture model lies in pluggable modules that can be<br />

configured according to the requirements and existing IT resources.<br />

The interface layer allows you to connect different modules responsible for<br />

authentication, authorization and user registry.<br />

The pluggable user registry allows you to configure different databases to store<br />

user IDs and passwords that are used for authentication. Detailed information on<br />

how to interface to custom registry using the UserRegistry interface can be found<br />

in Chapter 8, “Programmatic security” on page 179.<br />

NT/Unix<br />

user<br />

registry<br />

LDAP<br />

user<br />

registry<br />

Custom<br />

user<br />

registry<br />

SWAM LTPA JAAS<br />

Tivoli<br />

Access<br />

Manager<br />

z/OS<br />

other<br />

vendor's<br />

ORB<br />

Pluggable User<br />

Registry<br />

Pluggable<br />

Authentication<br />

<strong>WebSphere</strong> Application Server<br />

Pluggable<br />

Authorization<br />

<strong>IBM</strong><br />

CSIv2<br />

CSIv2<br />

<strong>IBM</strong><br />

Figure 9-6 <strong>WebSphere</strong> V5 extensible security architecture<br />

The pluggable authentication module allows you to choose whether <strong>WebSphere</strong><br />

will authenticate the user or will accept the credentials from external<br />

authentication mechanisms. For information on how to configure <strong>WebSphere</strong> to<br />

use credentials from <strong>IBM</strong> Tivoli Access Manager, please refer to Chapter 12,<br />

“Tivoli Access Manager” on page 369. In the future, this authentication interface<br />

will be extended to include other external authentication systems.<br />

Pluggable authorization interfaces will allow the use of different authorization<br />

mechanisms for <strong>WebSphere</strong> applications. In the current version, JAAS is<br />

supported and Tivoli Access Manager is an external authorization system.<br />

Chapter 9. <strong>WebSphere</strong> Application Server security 223

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!