03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

11.3.1 Runtime pattern for Self-Service:Directly Integrated Single Channel<br />

application pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356<br />

11.3.2 Runtime pattern for Access Integration:: Extended Single Sign-On<br />

application pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358<br />

11.3.3 Combined Runtime pattern for the ITSOBank sample application 361<br />

11.4 Product mappings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362<br />

11.4.1 Product mappings for the ITSOBank sample application . . . . . . . 362<br />

11.5 <strong>Security</strong> guidelines in Patterns for e-business . . . . . . . . . . . . . . . . . . . 365<br />

11.5.1 Securing connections in a solution . . . . . . . . . . . . . . . . . . . . . . . . 365<br />

11.6 More information on Patterns for e-business . . . . . . . . . . . . . . . . . . . . 367<br />

Chapter 12. Tivoli Access Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369<br />

12.1 End-to-end security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371<br />

12.2 Network identity and centralized security services . . . . . . . . . . . . . . . . 372<br />

12.3 Tivoli Access Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374<br />

12.3.1 Environment for the scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . 378<br />

12.4 Scenario 1: Shared user registries . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380<br />

12.4.1 Single Sign-On with WebSEAL . . . . . . . . . . . . . . . . . . . . . . . . . . . 386<br />

12.4.2 Forms Authentication Single Sign-On . . . . . . . . . . . . . . . . . . . . . . 408<br />

12.4.3 Tivoli Access Manager plug-in for <strong>WebSphere</strong> Edge Server . . . . 410<br />

12.5 Scenario 2: Protecting Web resources . . . . . . . . . . . . . . . . . . . . . . . . . 412<br />

12.5.1 Tivoli WebSEAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412<br />

12.6 Scenario 3: Tivoli’s <strong>WebSphere</strong> plug-in . . . . . . . . . . . . . . . . . . . . . . . . 431<br />

12.6.1 Access Manager For <strong>WebSphere</strong> Application Server. . . . . . . . . . 431<br />

12.6.2 Migration of applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436<br />

12.7 Scenario 4: Using the aznAPI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440<br />

Part 3. Appendixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443<br />

Appendix A. Sample application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445<br />

Sample application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446<br />

Application architecture brief. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446<br />

<strong>Security</strong> roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450<br />

Deploying the sample application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450<br />

Set up the database server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451<br />

Set up the database client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451<br />

Configuring the user registry for the ITSOBank sample . . . . . . . . . . . . . . 453<br />

Configuring <strong>WebSphere</strong> Application Server for the ITSOBank sample . . 454<br />

Importing the sample application into the development environment . . . . . . 458<br />

Where to find more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459<br />

Appendix B. LDAP configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461<br />

SecureWay Directory Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462<br />

<strong>IBM</strong> Directory Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462<br />

Contents<br />

vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!