13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 5-13 Selecting methods for the methods permission in <strong>WebSphere</strong> Studio10.Click Finish when done.5.6 Run-as mappingRun-as mapping refers to the process of assigning a real user from the userregistry that is a member of the specified security role to the bean-level ormethod-level delegation policies. Run-as mapping is very different from, buteasily confused with, security role mapping. The following table compares thesetwo concepts.Table 5-1 Run-as Mapping versus <strong>Security</strong> Role MappingRun-as MappingRun-as mapping is used to determine theprincipal from the user registry that will beused as the caller identity when adelegated EJB makes calls.Run-as mapping associates a single userthat is a member of the specified securityrole with a delegation policy<strong>Security</strong> Role Mapping<strong>Security</strong> role mapping is used todetermine the users and groups from theuser registry that will be consideredmembers of the security role.<strong>Security</strong> role mapping associates one ormore users or groups with a security role.92 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!