03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

►<br />

►<br />

►<br />

Users are mapped directly to specifc security roles.<br />

Groups are formed, users are defined as members of a group, and the groups<br />

are defined to specific security roles.<br />

A combination of user/group mapping to security roles is used to handle any<br />

exceptions.<br />

2.2.3 Public Key Infrastructure (PKI)<br />

This section provides a brief overview of the Public Key Infrastructure (PKI). PKI<br />

is a part of IT security and today‘s security needs bring it into focus.<br />

PKI is closely related to cryptography. Although it seems complicated, it is not.<br />

We do not need to use low-level mathematical algorithms, but we do need to<br />

understand the background involved.<br />

Secret key cryptography<br />

The secret key algorithms were invented earlier than were the public key<br />

algorithms. They use one key to encrypt and decrypt the data.<br />

Plain text Encryption Cipher text Decryption Plain text<br />

Figure 2-3 Symmetric key encryption<br />

Figure 2-3 illustrates the concept of symmetric key cryptography. The algorithms<br />

used provide a great advantage: they are faster than the public key cryptography<br />

introduced later. They have a considerable disadvantage as well: the same key is<br />

needed for encryption and decryption, and both parties must have the same<br />

keys. In today‘s cryptography, the secret keys do not belong to persons but to<br />

communication sessions. At the beginning of a session, one of the parties<br />

creates a session key and delivers it to the other party; they can then<br />

communicate securely. At the end of the session, both parties delete the key and,<br />

if they want to communicate again, must create another key.<br />

The following section will discuss how to secure the delivery of the session key.<br />

Public key cryptography<br />

The first imperative of public key cryptography is the ability to deliver the session<br />

keys securely. It has many more benefits than secret key cryptography, as we will<br />

see in the following section.<br />

12 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!