03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Security</strong> role mapping in the Administrative Console<br />

<strong>Security</strong> role mapping can be performed from the <strong>WebSphere</strong> Administrative<br />

console during application installation, or at any time once the application has<br />

been installed.<br />

Note: This section assumes that the user registry is set and configured for<br />

LDAP. For more information on user registry settings, refer to Section 10.4,<br />

“Configuring a user registry” on page 244.<br />

When installing an application using the <strong>WebSphere</strong> Administrative Console, one<br />

of the installation steps is to verify or define security role mapping. If security role<br />

mapping has been previously defined in the application’s deployment descriptor,<br />

the console will display that mapping and allow it to be modified.<br />

Note: If no security roles are defined in the application deployment descriptor,<br />

this step is omitted from the application installation steps.<br />

After an application has been installed, the security role mapping console can be<br />

accessed by following these steps:<br />

1. Click Applications -> Enterprise Applications.<br />

2. Click the name of the application you wish to modify.<br />

3. Under Additional Properties, click Map security roles to users/groups.<br />

The <strong>Security</strong> Role mapping console appears as shown in Figure 3-6 on page 33.<br />

In this example, the manager role is mapped to managergrp, the clerk,<br />

consultant, accountant roles are also mapped to the according groups; the<br />

mdbuser role is mapped to a user, mdbuser; the allauthenticated role is mapped<br />

to the All Authenticated special subject; and the everyone role is mapped to the<br />

Everyone special subject.<br />

Note: Assign the special subjects All Authenticated and Everyone as the last<br />

setting before you click Next; you will then not lose these settings when you<br />

look up users or groups.<br />

32 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!