13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

If one or more method-level delegation policies specify the Run-as system, oneof the installation steps will be to verify this policy. The dialog appears as inFigure 5-15, and for each method that specifies the Run-as system, theapplication deployer can do one of the following:► Do nothing, and allow the method to make calls using the system identity.► Assign the method a Run-as role, and map the role to a user from the registry.Figure 5-15 Verifying the Run-as systemTo override the Run-as system mapping and assign a Run-as role, do thefollowing:1. Select the methods to which you want to assign the Run-as role.2. Select the desired Role from the drop-down list of defined security roles.3. Enter the valid user name and password of a user in the registry that is amember of the specified security role.4. Click Apply to authenticate the user and associate that identity with therun-as role policy.5. Click Next to continue with the installation.94 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!