03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

LTPA requires that the configured User Registry be a central shared<br />

repository such as LDAP or a Windows Domain type registry.<br />

The following table summarizes the Authentication Mechanism capabilities and<br />

user registries used with LTPA.<br />

Table 9-1 Authentication mechanisms<br />

AuthC<br />

mech.<br />

Forwardable<br />

user<br />

credentials<br />

SSO<br />

Local OS<br />

user registry<br />

LDAP user<br />

registry<br />

Custom user<br />

registry<br />

SWAM no no yes yes yes<br />

LTPA yes yes yes yes no<br />

Future versions of <strong>WebSphere</strong> will support the Kerberos authentication<br />

mechanism to provide a broader selection and an industry standard mechanism<br />

for authentication.<br />

Authorization mechanisms<br />

<strong>WebSphere</strong> Application Server standard authorization mechanisms are based<br />

on the J2EE security specification and Java Authentication and Authorization<br />

Services. JAAS extends the security architecture of the Java 2 Platform with<br />

additional support to authenticate and enforce access controls upon users.<br />

JAAS programming models allows the developer to design application<br />

authentication in a pluggable fashion, which makes the application independent<br />

from the underlying authentication technology.<br />

Java 2 security architecture uses security policy to specify who is allowed to<br />

execute a code of the application. Code characteristics, like a code signature,<br />

signer ID, or source server, decide whether the code will be granted access to be<br />

executed or not. JAAS extends this approach with role-based access control.<br />

Permission to execute a code is granted not only based on the code<br />

characteristics but also on the user, who is running it.<br />

For each authenticated user, a Subject class is created and a set of Principals is<br />

included in the subject in order to identify that user. <strong>Security</strong> policies are granted<br />

based on possessed principals.<br />

Other security components<br />

The following list will show you other security components within <strong>WebSphere</strong><br />

Application Server V5.<br />

226 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!