03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

As a next step, you have to make sure that the application is using the right<br />

LDAP settings for the filter. Actually, you will have to change them in the .ear file<br />

and redeploy the ITSOBank application in <strong>WebSphere</strong>. In order to avoid all the<br />

security mappings, you can simply export the application from <strong>WebSphere</strong> and<br />

do the modifications on the exported .ear file.<br />

Open the ITSOBank application in the Application Assembly Tool and select<br />

itsobank -> Web modules -> itsobankWeb -> Filters -> PostLoginFilter -><br />

Initialization Parameters. Modify the filter initialization settings: BaseDN,<br />

ServerName, ServerPort, UserAttr to reflect your runtime configuration, then<br />

click Apply and save the .ear file. Use this latest version of the .ear file and<br />

deploy it in <strong>WebSphere</strong>.<br />

To test the custom login implemented in this section, open the sample ITSOBank<br />

application included with the book, using your browser at:<br />

http:///itsobank.<br />

Select the link on the main page which says: Modified Customer Transfer.<br />

When you have security enabled, the application returns the login page first.<br />

Once you have logged in with the right user, you will see the employeeType<br />

value at the bottom of the customertransfer.jsp page.<br />

4.5.3 Form-based logout<br />

One of the <strong>IBM</strong>’s extensions to the J2EE Specification is the form-based logout.<br />

After logging out, the user is required to re-authenticate to have access to<br />

protected resources again. This logout form can be on any page with calling a<br />

POST action on the ibm_security_logout servlet. This form must exist within the<br />

same Web application to which the user gets redirected after logging out.<br />

Example 4-7 Sample logout form from the ITSOBank application<br />

<br />

<br />

<br />

<br />

Today’s e-business Web applications require strict and well-designed security;<br />

providing the logout function is one of the important functions. Obviously, closing<br />

the browser and destroying the session is always an option for the user, but it is<br />

not the most intelligent solution to finish a session with an application.<br />

Combining the logout function with programmatic security, one can implement<br />

step-up re-authentication, where the user can change credentials and can get<br />

higher authority in the application.<br />

68 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!