03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►<br />

Application tier: may represent a new or existing application that will be part of<br />

the Single Sign-On domain. In our case, these applications are the<br />

<strong>WebSphere</strong> J2EE ITSOBank application and a simple Domino application<br />

used with ITSOBank.<br />

11.3 Creating the Runtime pattern for the ITSOBank<br />

application<br />

Runtime patterns represent a very high level physical solution architecture,<br />

where networks and nodes are identified but no product selection has been<br />

done. Most Runtime patterns will consist of the core set of nodes used for Web<br />

application design with additional nodes specific to the customer situation.<br />

In this section, we briefly describe Runtime patterns for both Self-Service::<br />

Directly Integrated Single Channel and the Access Integration:: Extended Single<br />

Sign-On application pattern. At the end of this section, we will provide a Runtime<br />

pattern for the ITSOBank sample application. This combined Runtime pattern will<br />

be used in the Product mapping section to map certain products and to describe<br />

the security flow between the nodes.<br />

11.3.1 Runtime pattern for Self-Service:Directly Integrated Single<br />

Channel application pattern<br />

Our Runtime pattern for Self-Service application is based on a simple three tier<br />

architecture where the Web server is separated from Web application server.<br />

The Web server resides in the demilitarized zone and is responsible for the Web<br />

presentation logic. The application server runs the application business logic and<br />

communicates with the back-end systems and databases.<br />

The LDAP directory is installed behind the domain firewall and is used to store<br />

user information related to authentication and authorization.<br />

356 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!