13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring the InterceptorIn order to make an inteceptor configurable, it is necessary for it to extendcom.ibm.websphere.security.<strong>WebSphere</strong>BaseTrustAssociationInterceptor.Three methods must be implemented.►►►public int init(java.util.Properties)Accepts a Properties object which contains the necessary interceptorconfiguration information.public int init(String)Accepts a file name for a file that contains the necessary interceptorconfiguration information. The format of the properties file is specified in theInfocenter.public void cleanup()Prepares the Interceptor for termination.Configuring <strong>WebSphere</strong> to use the InterceptorOnce the Interceptor has been installed and the trust association is configured,the application server may receive requests from the reverse proxy server. Theauthentication method used must be LTPA and authentication cannot bedelegated to a reverse proxy server if the user registry is LocalOS. Forinformation regarding the configuration of <strong>WebSphere</strong> for LTPA, refer to 10.6,“LTPA” on page 250 and for Trust Association Interceptors, refer to 12.4.1,“Single Sign-On with WebSEAL” on page 386.Note: The InfoCenter provides information regarding the setup of TivoliWebSEAL as a reverse proxy and the application server includes animplementation of the TAI for this product. Also, refer to 12.5.1, “TivoliWebSEAL” on page 412.Custom Trust Association InterceptorThis section will provide information on how to develop your own TrustAssociation Interceptor, how to configure a new Interceptor for <strong>WebSphere</strong> andfinally how to test it.Important: The custom Trust Association Interceptor here is only provided toshow how to develop a custom Interceptor. The Interceptor provided here isnot secure enough to use in any real environment.Developing the custom Trust Association InterceptorThe Trust Association Interceptor (TAI) for this book was developed using the<strong>WebSphere</strong> Studio.Chapter 8. Programmatic security 191

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!