03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In another example, a servlet in the Web container on the application server<br />

accesses an EJB in the EJB container on the application server. The same thing<br />

happens as in the previous example; the application server has to authenticate<br />

the servlet’s request on behalf of the EJB, then check the authorization.<br />

When you design an enterprise application or security for an application, you will<br />

have a similar, but more detailed diagram for your solution. Make sure that you<br />

have taken every connection into consideration between each element and<br />

module. <strong>Security</strong> in this context consists of two major parts: authentication and<br />

authorization. Make sure that the access is always authenticated or the security<br />

credentials are propagated; also make sure that the access is authorized and<br />

prepare with an action if authorization is not granted.<br />

For more information, read the security related sections of the Java 2 Platform<br />

Specification V1.3 at:<br />

http://java.sun.com/j2ee/docs.html<br />

3.2 <strong>Security</strong> roles<br />

The J2EE specification defines a security role as: “A logical groupings of users<br />

that are defined by an Application Component Provider or Assembler”. <strong>Security</strong><br />

roles provide a mechanism whereby application developers determine the<br />

security policies for an application by creating named sets of users (for example:<br />

managers, customers, employees, and so on) that will have access to secure<br />

resources and methods. At application assembly time, these sets of users, or<br />

security roles, are not tied to any real users or groups of users. Instead, they are<br />

placeholders which are later mapped to real users and groups at application<br />

deployment time, during a process called security role mapping.<br />

Chapter 3. J2EE application security 23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!