03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 5-4 Choosing security roles<br />

5. Click Next... to see the list of EJBs. Select one or more EJBs from the list.<br />

6. Click Next... to see the list of methods. Select one or more methods, using<br />

the wildcards (*) if desired to include all methods of a given type or all<br />

methods for a given EJB.<br />

7. Click Finish when done.<br />

Assigning roles to unprotected methods<br />

During application installation, the <strong>WebSphere</strong> Administrative Console allows<br />

you to specify what method permissions are applied to session and entity EJB<br />

methods that are not explicitly secured in the deployment descriptor. If all session<br />

and entity EJB methods are protected, this step is omitted.<br />

Note: When assigning roles to EJB methods, methods can be specified using<br />

several types of wildcards to select all home methods, local methods, local<br />

home methods, remote methods, and so on. When installing an EJB<br />

containing methods that are protected using one method-type wildcard (for<br />

example, the home methods wildcard) but whose other methods are<br />

unprotected, the <strong>WebSphere</strong> Application Server does not prompt for how<br />

unprotected methods are to be secured. Instead, they are deselected.<br />

Chapter 5. Securing EJBs 79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!