03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

WebSEAL<br />

Authenticated Users<br />

before forwarding<br />

requests for protected<br />

resources<br />

<strong>WebSphere</strong> Application Server<br />

Container integrated<br />

with Access Manager<br />

J2EE Application<br />

Deployment<br />

Descriptor<br />

Access Manager's<br />

LDAP User Registry<br />

Access Manager<br />

Authorization Server<br />

Access Manager's<br />

Policy Server<br />

Figure 12-24 Access Manager for <strong>WebSphere</strong> beta Model<br />

When a user requests a protected resource, WebSEAL authenticates the user<br />

against the Access Manager user registry. Junction configuration defines the<br />

type and number of credentials then forwarded to the application server.<br />

The container examines the request for access to a protected resource and from<br />

the J2EE application deployment descriptor, determines the required role that the<br />

user must have to be granted authorization. The container then hands off to the<br />

integrated Access Manager module.<br />

The Access Manager module requests an authorization decision from an<br />

Access Manager authorization server which checks with its local replica of the<br />

Access Manager policy database. Replicas are normally updated on a pull basis<br />

from the single Access Manager Policy Master within the <strong>Security</strong> Domain.<br />

While these calls can be made to a remote server, without the embedded Access<br />

Manager promised for the final <strong>WebSphere</strong> Application Server V5, performance<br />

and scalability require that an Access Manager Authorization Server be installed<br />

on the same platform as <strong>WebSphere</strong>. Of course, this means that the<br />

performance burden is passed to the platform hardware which must be capable<br />

of bearing both loads.<br />

Having returned the access decision, granted or denied, to the container,<br />

<strong>WebSphere</strong> then acts on it.<br />

432 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!