03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►<br />

If the startServer and stopServer scripts are started from the command line<br />

with the username and password options, then <strong>WebSphere</strong> will start under<br />

the supplied identity. For example:<br />

stopserver server1 -username -password <br />

It is also necessary to provide appropriate details to log in to the Administrative<br />

Console. To gain access to the Administrative Console, the user must either:<br />

►<br />

►<br />

Log in as a user that is a member of one of the four <strong>WebSphere</strong><br />

administrative roles (see 10.3, “Administrative roles” on page 239 for details).<br />

Log in under the identity supplied in the user registry panel.<br />

Figure 10-2 Administrative Console requires a valid administrative identity<br />

10.3 Administrative roles<br />

The J2EE role-based authorization concept has been extended to protect the<br />

<strong>WebSphere</strong> Administrative subsystem. Four roles are defined for performing<br />

administrative tasks.<br />

Table 10-1 <strong>WebSphere</strong> Administrative roles<br />

Role<br />

monitor<br />

Description<br />

Least privileged; allows a user to view the<br />

<strong>WebSphere</strong> configuration and current<br />

state.<br />

Chapter 10. Administering <strong>WebSphere</strong> security 239

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!