03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A .htaccess file placed in one directory applies to all its subdirectories. In such a<br />

case it is equivalent to a section in the httpd.conf file. If there is more<br />

than one access files in a directory tree, the directives set in a file for<br />

subdirectory take precedence over the directives in the parent directory.<br />

There are a number of directives that can be overridden. When dealing with<br />

security, we are interested in the AuthConfig category of directives that will allow<br />

the use of authorization directives such as AuthUserFile, AuthGroupFile,<br />

AuthDBMGroupFile and others. To override this category, change the directive in<br />

httpd.conf file to:<br />

Example 4-3 <strong>Security</strong> configuration in httpd.conf<br />

<br />

AllowOverride AuthConfig<br />

Options None<br />

<br />

For more information on how to use .htaccess see the Apache tutorial at:<br />

http://apache-server.com/tutorials/ATusing-htaccess.html<br />

The drawback of using .htaccess files is a negative impact on the performance of<br />

the Web server. As mentioned before, when the use of .htaccess files is enabled,<br />

for any resource requested from one directory, Web server also checks all parent<br />

directories for .htaccess files and tries to merge the configuration in order to<br />

decide whether the user is entitled to read the resource or not.<br />

The other problem with the .htaccess files is the system management. It is<br />

difficult to maintain, especially in a centralized security infrastructure.<br />

4.1.3 Other Web server security aspects<br />

This book is not dedicated fully to discussing Web server security, and a sample<br />

scenario only has been chosen to show how to secure Web server using LDAP<br />

user registry. This LDAP server can be shared with the application server in order<br />

to manage a user’s authorization to specific Web application resources. This is<br />

discussed in the following chapters.<br />

However, when writing about Web server security, it not necessary to mention<br />

other possible means that can be used to secure either the Web server daemon<br />

process or user access to Web server resources. Next is a short list of what you<br />

can take into account for securing the Web server when designing the system to<br />

run secure Web applications:<br />

44 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!