03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Without an Access Manager authentication blade such as WebSEAL, a Web<br />

server with an Access Manager plug-in or <strong>WebSphere</strong> Edge Server with the<br />

Access Manager plug-in, the <strong>WebSphere</strong> container would request authentication<br />

of the user from the user registry directly. The authorization process would then<br />

be identical, however.<br />

The advantages of externalizing the control of the security model have been<br />

discussed earlier. The specific advantage of the integrated Access Manager<br />

module is that J2EE applications do not require coding changes to take<br />

advantage of the dynamic flexibility, allowing changes to user and group<br />

mappings to roles without stopping and starting an application through the<br />

manipulation of Access Manager ACLs.<br />

The highest prefix to all J2EE roles defined for <strong>WebSphere</strong> applications is the<br />

Access Manager protected object for “WebAppServer” together with the child<br />

object “deployedResources”. Both these object names are created the first time<br />

the Access Manager application migration tool is run.<br />

/<br />

"WebAppServer"<br />

"deployedResources"<br />

<br />

<br />

<br />

<br />

<br />

Figure 12-25 Access Manager Protected Object Name Space<br />

Figure 12-25 shows the Access Manager name space to which users and groups<br />

are associated with roles and applications and optionally, down to the cell, host<br />

or server. ACLs can be placed at any point in this name space, determining<br />

which J2EE roles any principal governed by those ACLs has been assigned. The<br />

Access Manager migration tool automatically attaches the ACLs at the<br />

“AppName” level. As with all ACLs in the object space, the permissions must be<br />

continuous and the lower level ACL overrides a higher ACL.<br />

Chapter 12. Tivoli Access Manager 433

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!