03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Principals and Groups<br />

<strong>Security</strong> Roles<br />

EJB Methods<br />

Fred<br />

Manager<br />

Consultant<br />

Mary<br />

<strong>Security</strong> Role<br />

Mapping<br />

Accountant<br />

Web Component Resources<br />

JSPs<br />

Servlets<br />

Department XYZ<br />

Static<br />

Content<br />

Clerk<br />

Figure 3-2 <strong>Security</strong> roles<br />

This two-phase security administration approach allows for a great deal of<br />

flexibility and portability. Deployers of an application have full control over how<br />

their local users and groups are mapped to the application’s security roles, and<br />

over what authorization and authentication mechanisms are used to determine<br />

role membership.<br />

At deployment time, security roles can be mapped to users, groups of users, or<br />

special subjects. There are two special subjects in <strong>WebSphere</strong> Version 5:<br />

► All Authenticated Users<br />

► Everyone<br />

24 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!