03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.Ensure the Client Authentication is enabled. This is optional and is enabled in<br />

this example.<br />

11.Ensure the <strong>Security</strong> Level is set to High.<br />

12.Ensure that the Cryptographic Token box is not selected.<br />

13.It is not necessary to provide any custom properties. Click OK.<br />

14.Save the changes to the master configuration by selecting the link at the top<br />

of the window.<br />

The password is stored in a file called security.xml in<br />

/config/cells/ and is protected with an Base64<br />

ASCII encoding.<br />

Example 10-4 Excerpt from security.xml<br />

<br />

<br />

<br />

Note: Although the password appears as a series of asterisks in the Admin<br />

console, it will be stored in an easily readable string in the repository. It is a<br />

simple task for an eavesdropper to decode this string and recover the<br />

password and so it is important to protect the respository from unauthorized<br />

users.<br />

The appropriate <strong>WebSphere</strong> components may now be set to use the<br />

newly-defined SSL configuration. It might also be necesary to configure some<br />

non-<strong>WebSphere</strong> components, such as a Web server, in order to ensure a secure<br />

connection between all components. Typically, a digital certificate will be created<br />

for each component. In a Web server scenario, for instance, the <strong>WebSphere</strong><br />

server will own a certificate and the Web server will own another. The certificates<br />

will identify the particular component by which they are owned.<br />

Chapter 10. Administering <strong>WebSphere</strong> security 277

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!