03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 10-4 Mapping a group to an Administrative role<br />

10.3.1 CosNaming roles<br />

The J2EE role-based authorization concept has been extended to protect the<br />

<strong>WebSphere</strong> CosNaming service. CosNaming security offers increased<br />

granularity of security control over CosNaming functions, which affect the content<br />

of the <strong>WebSphere</strong> Name Space. There are generally two ways in which client<br />

programs will make a CosNaming call. The first is through the JNDI interfaces.<br />

The second is CORBA clients invoking CosNaming methods directly. Four roles<br />

are defined.<br />

Table 10-2 CosNaming roles<br />

Role<br />

Cos Naming Read<br />

Cos Naming Write<br />

Description<br />

Users who have been assigned the<br />

CosNamingRead role will be allowed to<br />

perform queries of the <strong>WebSphere</strong> Name<br />

Space, such as through the JNDI lookup<br />

method. The special subject Everyone is<br />

the default policy for this role.<br />

Users who have been assigned the<br />

CosNamingWrite role will be allowed to<br />

perform write operations such as JNDI<br />

bind, rebind, or unbind, plus<br />

CosNamingRead operations. The<br />

special-subject, AllAuthenticated, is the<br />

default policy for this role.<br />

242 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!