03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 3-7 Searching for the manager group<br />

4. Click OK to accept the changes and close the group lookup window.<br />

5. Click OK to accept and close the <strong>Security</strong> role mapping window.<br />

6. Save the <strong>WebSphere</strong> configuration to make the changes effective.<br />

3.6 Modifying applications<br />

This section discusses two simple scenarios:<br />

► Modifying the security role mapping for an enterprise application after<br />

deployment.<br />

► Redeploying a secure application.<br />

Modifying the security role mapping<br />

There are certain situations when role mapping needs to be changed after<br />

deployment or cannot be performed during deployment. <strong>WebSphere</strong> Application<br />

Server V5 lets the administrator perform the security role mapping on a deployed<br />

application using the Administrative Console.<br />

34 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!