13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►►►►►Operating system security should be considered in order to protect sensitive<strong>WebSphere</strong> configuration files and to authenticate users when operatingsystem user registry is used for authentication. This is extremely important ina distributed <strong>WebSphere</strong> environment when potentially different operatingsystems and different user registries might be involved. Keeping the users(and their passwords) and groups in sync across many different machinesmight be a problematic administration task.Standard Java security is provided through the Java Virtual Machine (JVM)used by <strong>WebSphere</strong> and the Java security classes.Java 2 security enhances standard Java Virtual Machine security byintroducing fine grained access, easily configurable security policy, extensibleaccess control structure and security checks for all Java programs (includingapplets).Common Secure Interoperability protocol adds additional security featuresthat enable interoperable authentication, delegation and privileges in CORBAenvironment. It supports interoperability with EJB 2.0 specification and can beused with SSL.J2EE security uses the security collaborator to enforce J2EE-based securitypolicies and support J2EE security APIs. APIs are accessed from <strong>WebSphere</strong>applications in order to access security mechanisms and implement securitypolicies.<strong>WebSphere</strong> Application Server V5 security relies and enhances all the abovementioned layers. It implements security policy for in unified manner for bothWeb and EJB resources.9.1.2 <strong>WebSphere</strong> security in a distributed environmentIn a distributed environment, <strong>WebSphere</strong> Application Server may be installed inthe Network Deployment configuration, where <strong>WebSphere</strong> creates a network ofapplication servers instances supporting clustering, caching and the efficientutilization of shared resources. Figure 9-2 presents a general architecture of the<strong>WebSphere</strong> deployment configuration.Chapter 9. <strong>WebSphere</strong> Application Server security 217

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!