03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

For any type of authentication methods to work, at least one security constraint<br />

should be defined for the requested Web resources and Global <strong>Security</strong> must be<br />

enabled for the application server.<br />

For instructions on how to define security constraints for Web resources, see<br />

4.2.1, “Configuring Web module security” on page 46.<br />

For instructions on how to enable Global <strong>Security</strong> on the server, please refer to<br />

10.2, “<strong>WebSphere</strong> Global <strong>Security</strong>” on page 235.<br />

When developing <strong>WebSphere</strong> applications, you can configure authentication<br />

methods using either <strong>WebSphere</strong> Studio or the <strong>WebSphere</strong> Application<br />

Assembly Tool. This chapter presents basic scenarios of how to set up login<br />

Authentication methods for the ITSObank application.<br />

4.5.1 Form-based login<br />

One of the login challenges defined in J2EE Specification is form-based login. It<br />

enables the application developer to customize the login process and present an<br />

application-specific form by making use of the Form Login Authentication<br />

Method.<br />

Form login works in the following manner:<br />

1. An unauthenticated user requests a resource protected by the Form Login<br />

authentication type.<br />

2. The application server redirects the request to the Login Form defined<br />

previously in the Web deployment descriptor.<br />

3. On the HTML login form, the user enters the user ID and password and<br />

submits the form.<br />

4. The action triggered by the form submission runs a special <strong>WebSphere</strong><br />

Application servlet j_security_check. The Web container, after receiving a<br />

request for the j_security_check servlet, dispatches the request to another<br />

<strong>WebSphere</strong> servlet that authenticates the user.<br />

5. If the servlet authenticates the user successfully, the originally requested<br />

resource is displayed.<br />

If you select LTPA as the authentication mechanism under global security<br />

settings and use form login in any Web application, you must also enable Single<br />

Sign-On (SSO). If SSO is not enabled, authentication during form login fails with<br />

a configuration error. SSO is required because it generates an HTTP cookie that<br />

contains information representing the identity of the user to the Web browser.<br />

This information is needed to authorize protected resources when a form login is<br />

used.<br />

Chapter 4. Securing Web components 59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!