03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

information to the security services, such as authentication and authorization<br />

service.<br />

11.3.3 Combined Runtime pattern for the ITSOBank sample<br />

application<br />

The ITSOBank sample application has only a few functions; it was designed to<br />

show the security capabilities of a J2EE application, <strong>WebSphere</strong> Application<br />

Server V5 and some of the end-to-end security design considerations.<br />

Please note that the functionality of the application as implemented in this book<br />

does not fully reflect real world scenarios. Therefore, this section should be used<br />

as a reference to implement similar solutions.<br />

Outside World<br />

Demilitarized Zone<br />

(DMZ)<br />

Internal Network<br />

Client<br />

Directory &<br />

<strong>Security</strong><br />

Server<br />

Registry<br />

data<br />

IP Network<br />

Protocol firewall<br />

Authentication<br />

Proxy<br />

Domain firewall<br />

Application<br />

Servers<br />

Application<br />

Server<br />

Existing<br />

application<br />

and data<br />

Existing<br />

application<br />

and data<br />

Figure 11-7 Runtime pattern for ITSOBank application<br />

The sample application fits into the Runtime pattern from 11.3.2, “Runtime<br />

pattern for Access Integration:: Extended Single Sign-On application pattern” on<br />

page 358.<br />

Chapter 11. <strong>Security</strong> in Patterns for e-business 361

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!