03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4. Fill out the fields according to the following screen capture.<br />

Figure 4-5 New role for the Web module<br />

5. Click OK.<br />

6. Repeat the steps above to create all the necessary roles for the Web module.<br />

7. Save the .ear file.<br />

Defining security constraints<br />

Providing an authentication mechanism for global application security does not<br />

provide the mechanisms to control access to the Web resources.<br />

<strong>Security</strong> constraints declare how the content of the application is protected. For a<br />

given security constraint, three things should be defined:<br />

►<br />

►<br />

►<br />

One or more Web resources that define actual application components that<br />

are to be protected by the security constraint. Web resource is a set of URL<br />

patterns and HTTP methods in those resources. All requests that will be<br />

matched with the pattern defined for a given Web resource will be subject to a<br />

security constraint.<br />

An authorization constraint that defines roles which will be provided access to<br />

the Web resources existing within the security constraint. An authorization<br />

constraint is a set of roles that the user must be granted in order to have<br />

access to a Web resource collection existing within a security constraint. In<br />

order to have access to the Web resource, the user should be granted at least<br />

one of the roles that are defined within the Authorization constraint.<br />

Used Data Constraint indicates the transport layer setting for client/server<br />

communication in order to satisfy given security constraint. This setting<br />

should guarantee either content integrity (preventing tampering in transit) or<br />

confidentiality (preventing reading data during transfer). User Data Constraint<br />

may override standard security settings for the application. For example,<br />

access to some functions of the application may require just basic login using<br />

a user ID and password, and at the same time some functions may require a<br />

Chapter 4. Securing Web components 49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!