03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6. Upon subsequent requests, only authorizations checks are performed either<br />

by the Web collaborator or the EJB collaborator, depending on what the user<br />

is requesting. User credentials are extracted from the established security<br />

context.<br />

Administrative tasks<br />

The steps below illustrate how the administration tasks are executed.<br />

1. Administrative tasks are issued using either the Web based Administrative<br />

Console or the wsadmin scripting tool.<br />

2. The administration client generates a request that reaches the server side<br />

ORB and JMX MBeans; JMX MBeans represent managed resources and are<br />

part of the management interface system for components. The default<br />

communication protocol is SOAP. It can be changed either by giving a<br />

parameter to the wsadmin program or modifying administration settings<br />

through the Administrative Console.<br />

3. JMX Beans contact the security server for authentication purposes. JAMX<br />

beans have dedicated roles assigned and do not use user registry for<br />

Authentication and Authorization.<br />

Java Client communication<br />

The steps below describe how a Java client interacts with a <strong>WebSphere</strong><br />

application.<br />

1. Java clients generates a request that reaches the server side ORB. The<br />

request may be gotten through the CSIv2 interceptor if the client’s request is<br />

generated using CSIv2.<br />

2. The server side ORB passes the request to the EJB container.<br />

3. Authentication is performed by the ORB, before the client gets access to<br />

protected resources.<br />

4. After submitting a request to the access protected EJB method, the EJB<br />

container passes the request to the EJB collaborator.<br />

5. The EJB collaborator reads the deployment descriptor from the .ear file and<br />

user credential from the security context.<br />

6. Credentials and security information is passed to the security server which<br />

validates user access rights and passes this information back to the<br />

collaborator.<br />

7. After receiving a response from the security server, the EJB collaborator<br />

authorizes or denies access to the user to the requested resource.<br />

For more detailed information about securing particular J2EE application<br />

modules, please refer to the appropriate sections.<br />

Chapter 9. <strong>WebSphere</strong> Application Server security 229

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!