03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

If you want to edit the security role mapping for an application, open the<br />

Administrative Console and click Applications -> Enterprise Applications.<br />

Select the application, for example ITSOBank, to get to the application details<br />

page. Select the Map security roles to users/groups link, which will bring up<br />

the same mapping page that you see during deployment.<br />

You can perform the security role mapping or you can change the actual<br />

mapping. After you are done, you have to restart only the enterprise application.<br />

The application will pick up the new mappings and will run with the new settings.<br />

Redeploying an application<br />

This may occur if you have a deployed and working enterprise application and<br />

you need to make some minor changes on the code or the application. It would<br />

be the case in a test environment or when dealing with an application on a<br />

staging server. Redeploying the whole application every time you make a change<br />

is time consuming and unnecessary.<br />

There is a fastpath for modifying and redeploying an application without losing<br />

the deployment information. Here is how to do it:<br />

1. Start the Administrative Console.<br />

2. Select the enterprise application under Applications -> Enterprise<br />

Applications, then click Export.<br />

3. Save the deployed application in a directory of your choice.<br />

4. You can either modify the application using the Application Assembly Tool, or<br />

import it into <strong>WebSphere</strong> Studio and perform the modifications there.<br />

5. Once you are done with the modifications, redeploy the application in your<br />

<strong>WebSphere</strong> Application Server. During deployment, you will not have to<br />

perform any new binding or mapping unless you have changed something<br />

related to mapping and binding, so just go to the last step, click Finish and<br />

you are done.<br />

Chapter 3. J2EE application security 35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!