03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

11.4 Product mappings<br />

This section presents an example of Product mappings for the Runtime pattern<br />

shown in Figure 11-7. We will focus only on the customer-based flow. We will not<br />

cover other flows that should be considered when working on a real life solution,<br />

such as an employees flow or a partners flow.<br />

11.4.1 Product mappings for the ITSOBank sample application<br />

Product mappings used in the scenario are presented in Figure 11-8.<br />

Outside World<br />

Netscape / Internet<br />

Explorer<br />

Client<br />

Demilitarized Zone<br />

(DMZ)<br />

Tivoli Access<br />

Manager V3.9 on<br />

Windows 2000<br />

Tivoli Access<br />

Manager WebSEAL<br />

3.9 on Windows 2000<br />

Internal Network<br />

<strong>IBM</strong> SecureWay<br />

Directory 3.2.2 on<br />

Windows 2000<br />

Directory &<br />

<strong>Security</strong><br />

Server<br />

<strong>IBM</strong> DB2 UDB 7.2<br />

Workgroup Edition<br />

on Windows 2000<br />

Registry<br />

data<br />

IP Network<br />

Protocol firewall<br />

Authentication<br />

Proxy<br />

Domain firewall<br />

Application<br />

Servers<br />

Application<br />

Server<br />

<strong>IBM</strong> eNetwork<br />

Firewall 4.2 on<br />

Windows NT 4.0<br />

<strong>IBM</strong> eNetwork<br />

Firewall 4.2 on<br />

Windows NT 4.0<br />

Existing<br />

application<br />

and data<br />

<strong>IBM</strong> DB2 UDB 7.2 FP<br />

5 Enterprise Edition on<br />

AIX 5L<br />

<strong>WebSphere</strong><br />

Application Server<br />

V5 on Windows 2000<br />

Lotus Domino 5.08a<br />

on Windows 2000<br />

Figure 11-8 Product mappings for ITSOBank application scenario<br />

362 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!