03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7. Save and close the web.xml file.<br />

Figure 4-11 Defining security roles references in Studio<br />

Note aboutroles visibility within the .ear file:<br />

Regarding roles, <strong>WebSphere</strong> 5 differs from <strong>WebSphere</strong> 4 on the topic of roles<br />

visibility. Each module can have independent logical roles. This means that if<br />

we define runtime roles on the application level, they do not roll down and are<br />

not visible in any application module. However, roles defined for modules will<br />

roll up and be visible on the application level. This will allow the creation of<br />

global references from the application down to the Web and EJB modules.<br />

4.5 Login facilities<br />

The J2EE Specification defines the following types of authentication methods.<br />

► Basic authentication<br />

► Digest authentication<br />

► Form based authentication<br />

► Client Certificate based authentication<br />

For a brief description of each type of authentication, see 4.2.1, “Configuring<br />

Web module security” on page 46.<br />

58 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!