13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

After running the client, you should see the messages from the different serversin your console. Check if you see the message from the PassThrough bean, andfrom the Bouncer bean, together with the caller user names.You can also turn on tracing for the <strong>WebSphere</strong> Application Servers then checkthe trace file and see what happened during the process.Scenario 2: BasicAuth, Identity Assertion and ClientCertificatesThis scenario is the same as Scenario 1 except for the interaction from clientClient02 to server Server02. Therefore, the configuration of Scenario 1 stillneeds to be in place, but we have to modify server Server02 slightly and add aconfiguration for client Client02. We will not be modifying the configuration forClient01 or Server01; follow the steps from “Scenario 1: BasicAuth and IdentityAssertion” on page 110.invocationcredential:user01user01identity assertion layerreceivedcredential:user01Juser01/userpwdmessage layerSSLtransport layerserver01/serverpwdmessage layerSSLtransport layerClient01Java clientServer01EJB serverServer02EJB serverJSSL: cn="user01",o=itsotransport layerClient02Java clientFigure 6-5 Scenario 2: BasicAuth, Identity Assertion and Client certificatesChapter 6. Securing Java clients 113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!