03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8. Add the GET and POST HTTP methods to the list.<br />

9. Next to URLs, click Add. You will be presented with the Add URLs entry box.<br />

10.Add the following URL patterns:<br />

/transfer/customertransfer.html<br />

/transfer/transferresults.jsp<br />

/serlvets/Transfer<br />

Click OK.<br />

The final result of the resource collection for the security constraint definition is<br />

shown next.<br />

Figure 4-8 <strong>Security</strong> constraints resource collection definition<br />

Securing components using <strong>WebSphere</strong> Studio<br />

The approach to defining security constraints in <strong>WebSphere</strong> Studio Application<br />

Developer is very similar to the one described above. In order to perform the<br />

same task for Transfer servlet security constraint, follow these steps:<br />

1. Open or select the J2EE perspective, and switch to the J2EE Hierarchy view.<br />

2. Open the Web Modules folder, then double-click the itsobankWeb item. This<br />

will open the editor with the Web deployment descriptor. Switch to the<br />

<strong>Security</strong> tab.<br />

3. Define a new security constraint, select <strong>Security</strong> Constraints tab at the top<br />

of the editor, then click the Add button under the <strong>Security</strong> Constraints window<br />

54 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!