13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

local or remote code (signed or not)security policyclass loaderapplicationapplicationJVMapplicationsandboxresourcesFigure 8-5 Java 2 Platform <strong>Security</strong> ModelThe new model is supposed to provide the following security features for theJava Virtual Machine:►►►►Fine-grained access control. It was available in the earlier version usingprogrammatic access control security.Easy configuration of security policy. It was available also like the previousfeatures, and again using programmatic security.Easy extension for the access control structure. The new architecture allowstyped security permissions and provides automatic handling for them.Extension of security checks to all Java programs (both applications andapplets). Every Java code is under security control, which means no localcode is trusted by default anymore.The fundamental concept and an important building block in system security isthe protection domain.Definition: A domain can be scoped by the set of objects that are currentlydirectly accessible by a principal, where a principal is an entity in the computersystem to which permissions are granted.Classes that have the same permissions but are from different code sourcesbelong to different domains.(From the Java 2 Platform <strong>Security</strong> Architecture V1.0 paper by SunMicrosystems)196 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!