03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

11.5 <strong>Security</strong> guidelines in Patterns for e-business<br />

The Patterns for e-business design approach also provides guidelines for<br />

solution design. The guidelines consist of technology options, application design<br />

and development, security, performance and availability, and system<br />

management. The following short sections will point out some common security<br />

guidelines that should be taken into consideration when designing an e-business<br />

solution.<br />

11.5.1 Securing connections in a solution<br />

At the architecture level, as opposed to the application level, connections<br />

between nodes should be secured. For information in relation with this topic, at<br />

the application level, where secure connections should be ensured between<br />

modules, refer to 3.1, “J2EE application” on page 22.<br />

The purpose of securing the communication is to prevent non-authorized<br />

persons and systems from listening to the communication or participating in the<br />

interaction.<br />

Figure 11-9 shows the commonly used and highly recommended secure<br />

communication lines between nodes.<br />

Outside World<br />

Demilitarized Zone<br />

(DMZ)<br />

Internal Network<br />

Client<br />

Directory &<br />

<strong>Security</strong><br />

Server<br />

SSL<br />

Registry<br />

data<br />

HTTPS<br />

LDAPS<br />

LDAPS<br />

LDAPS<br />

IP Network<br />

Protocol firewall<br />

Application HTTPS<br />

Authentication<br />

Proxy<br />

Servers<br />

HTTPS HTTPS HTTPS IIOP / SSL<br />

Domain firewall<br />

Application<br />

Server<br />

SSL<br />

Existing<br />

application<br />

and data<br />

SSL<br />

Existing<br />

application<br />

and data<br />

Figure 11-9 Secure connection between nodes<br />

Chapter 11. <strong>Security</strong> in Patterns for e-business 365

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!