13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

LTPA requires that the configured User Registry be a central sharedrepository such as LDAP or a Windows Domain type registry.The following table summarizes the Authentication Mechanism capabilities anduser registries used with LTPA.Table 9-1 Authentication mechanismsAuthCmech.ForwardableusercredentialsSSOLocal OSuser registryLDAP userregistryCustom userregistrySWAM no no yes yes yesLTPA yes yes yes yes noFuture versions of <strong>WebSphere</strong> will support the Kerberos authenticationmechanism to provide a broader selection and an industry standard mechanismfor authentication.Authorization mechanisms<strong>WebSphere</strong> Application Server standard authorization mechanisms are basedon the J2EE security specification and Java Authentication and AuthorizationServices. JAAS extends the security architecture of the Java 2 Platform withadditional support to authenticate and enforce access controls upon users.JAAS programming models allows the developer to design applicationauthentication in a pluggable fashion, which makes the application independentfrom the underlying authentication technology.Java 2 security architecture uses security policy to specify who is allowed toexecute a code of the application. Code characteristics, like a code signature,signer ID, or source server, decide whether the code will be granted access to beexecuted or not. JAAS extends this approach with role-based access control.Permission to execute a code is granted not only based on the codecharacteristics but also on the user, who is running it.For each authenticated user, a Subject class is created and a set of Principals isincluded in the subject in order to identify that user. <strong>Security</strong> policies are grantedbased on possessed principals.Other security componentsThe following list will show you other security components within <strong>WebSphere</strong>Application Server V5.226 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!