13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3. On the back-end server, the Bouncer session EJB captures the message,attaches its own message with the caller’s user name, and returns themessage to the front-end server.4. The PassThrough session EJB gets the response, attaches its own messagetogether with the caller’s user name; client is the caller.5. The client gets the response back from the front-end server and dumps it outto the standard out.JJ2EE clientPassThroughBeanBouncerBeanFigure 6-2 Identity Assertion applicationThere is a .properties file for the application, which stores the information for theEJB clients, where to find the EJB server. It is stored in theIDAssertionCommon.jar file, called ejblocations_en_US.properties. You canmodify the settings using the Application Assembly Tool, <strong>WebSphere</strong> Studio orediting the file in the deployed application. Specify the following properties for theapplication, for example:ejb.front.server.hostname=server01ejb.front.server.port=2809ejb.back.server.hostname=server02ejb.back.server.port=2809Leave the bean names unchanged.The sample application is running in a three machine environment; scenario 2might require a second client machine, unless you reconfigure the first client.In this environment, the client machine is running the <strong>WebSphere</strong> Client runtime,installed from the <strong>WebSphere</strong> Client CD, while the other two systems are runningthe <strong>WebSphere</strong> Application Server base server.Chapter 6. Securing Java clients 109

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!