03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<br />

everyone<br />

<br />

In the ibm-application-bnd.xmi file, security roles are mapped to users or groups<br />

in the User Registry. Table 3-2 shows how the security roles defined above would<br />

be mapped.<br />

Table 3-2 Role mappings<br />

<strong>Security</strong> Role<br />

manager<br />

consultant<br />

clerk<br />

accountant<br />

allauthenticated<br />

everyone<br />

Mapped to<br />

managergrp<br />

consultantgrp<br />

clerkgrp<br />

accountantgrp<br />

All Authenticated Users (special subject)<br />

Everyone (special subject)<br />

The following example is a code snippet from the ibm-application-bnd.xml file<br />

that holds the binding information for the J2EE roles.<br />

Example 3-2 <strong>Security</strong> role mappings in the ibm-application-bnd.xmi file<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Chapter 3. J2EE application security 27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!