03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The new certificate should appear under the Personal tab. Close the<br />

certificates and the options dialog.<br />

8. In the browser, access the <strong>WebSphere</strong> application again, for example:<br />

https://wassrv01.itso.ibm.com:9080/itsobank.<br />

9. The browser will ask which personal certificate to use for the connection;<br />

select the certificate, then continue the connection.<br />

10.The Web page should come up with the right content.<br />

Once the browser test with direct <strong>WebSphere</strong> access is successful, test the<br />

connection through the Web server. Open a Web browser and access the Web<br />

application using the normal port settings (port 80), for example:<br />

http://wassrv01.itso.ibm.com/itsobank. The Web page should appear with<br />

the right content.<br />

10.12 SSL between the Java client and <strong>WebSphere</strong><br />

SSL may be used to secure a connection between two ORBs. When a Java<br />

client invokes a method on a remote EJB, the client and server ORBs will<br />

communicate information in the clear. SSL can protect information being passed<br />

over the IIOP protocol in the same way that it protects information being passed<br />

over other protocols.<br />

In order to establish an inter-ORB connection, <strong>WebSphere</strong> demands that the<br />

identity of the client be provided. This has no relation to the role-based security<br />

used to protect the J2EE application, although the identity passed during the SSL<br />

initialization sequence can be used for authorization purposes.<br />

10.12.1 Creating the key stores<br />

In order to secure the ORB communication, you will need to create the key file<br />

and trust file pairs for the server and the client; you will then also need to<br />

exchange the certificates between the two parties.<br />

Follow the steps in 10.9, “Demo keyfile” on page 261 to create the key store and<br />

trust store file pairs. Use the following file and keylabel names and save them in a<br />

directory where you will find them, for example: \etc.<br />

►<br />

►<br />

►<br />

►<br />

Server key file: ServerKeyFile.jks<br />

Server certificate label: ServerKey<br />

Server trust file: ServerTrustFile.jks<br />

Client key file: ClientKeyFile.jks<br />

310 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!