03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Management<br />

Server<br />

Access Manager DMZ<br />

Policy Store<br />

<strong>Security</strong> Proxy<br />

User Registry<br />

Customers<br />

WebSeal Reverse<br />

Proxy<br />

Authentication<br />

Authorization<br />

Audit<br />

Authorization<br />

Server<br />

Web Portal<br />

Manager<br />

Internet<br />

Web Server<br />

<strong>WebSphere</strong><br />

Application Server<br />

Authorization<br />

Audit<br />

Middleware<br />

Application Server<br />

Authorization<br />

Audit<br />

Back Office<br />

Systems<br />

Authorization<br />

Internet DMZ Region 1 DMZ Region 2 Intranet<br />

Figure 12-1 Typical three-tier infrastructure supporting e-business applications<br />

Access Manager requires a User Registry and can be configured to use many<br />

products, including Microsoft Active Directory and iPlanet, but ships with <strong>IBM</strong><br />

SecureWay LDAP Directory V 3.2.2, underpinned by the <strong>IBM</strong> DB2 Universal<br />

Database.<br />

The Access Manager Policy Server maintains the master authorization policy<br />

database which contains the security policy information for all resources and all<br />

credentials information of all participants within the secure domain, both users<br />

and servers. A secure domain contains physical resources requiring protection.<br />

These resources include programs, files and directories. A virtual representation<br />

of these resources, protected by attaching ACL and POP policies, is stored by<br />

the Policy Server.<br />

Chapter 12. Tivoli Access Manager 375

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!