03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

8. Next to HTTP Methods click Add. You will be presented with the Add HTTP<br />

methods dialog box.<br />

9. Add the GET and POST HTTP methods to the list.<br />

10.Next to URLs, click Add. You will be presented with the Add URLs entry box.<br />

11.Add the following URL patterns:<br />

/index.html<br />

/error/*<br />

/images/*<br />

/login/*<br />

/style/*<br />

Click OK.<br />

The final result of the resource collection for the security constraint definition is<br />

shown next.<br />

Figure 4-7 <strong>Security</strong> constraints resource collection definition<br />

4.3.2 Servlets and JSPs<br />

<strong>WebSphere</strong> Application Server can secure dynamic resources such as servlets<br />

using role-based declarative security mechanisms. This means that the logical<br />

application security structure is defined independently from the application itself.<br />

The logical security structure is stored in deployment descriptors of the<br />

application.<br />

52 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!