13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

J2EE Connector architecture establishes contracts amongst the application, theresource adapter and the application server, where the application will eventuallybe deployed. These contracts imply that all the participating components areJ2EE Connector architecture compliant for the sake of working together. Theapplication contract is nothing more than the definition for the communicationbetween connector and the application.The system contract defines the connection management, transactionmanagement and the security management.ApplicationApplicationContractConnectoror ResourceAdapterEIS-specificinterfaceEnterpriseInformationSystem (EIS)ContainercontractSystem contract-Connectionmanagement-Transactionmanagement-<strong>Security</strong> managementApplication ServerConnectionManagerTransactionManager<strong>Security</strong>ManagerFigure 7-27 J2EE Connector architectureThe security contract enables the application server to connect to an EnterpriseInformation System using security properties. The application serverauthenticates with the EIS system by using the security properties the usercredentials.There are two different methods the application server can authenticate to anEnterprise Information System.► Container-managed sign-on: the security properties are configured whenthe resource adapter is deployed on the application server. Again there areseveral ways to configure security properties here. With Configured Identityall resource adapter connections use the same identity when connecting tothe Enterprise Information System. With Principal Mapping the principalused when connecting to the Enterprise Information System based on acombination of the current principal in the application server and the mapping.With Caller Impersonation the principal used in the Enterprise Information170 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!