13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Security</strong> server<strong>Security</strong> server is a component of <strong>WebSphere</strong> Application Server that runs ineach application server process. If multiple application server instances areexecuted on a single node, then multiple security servers exist on that node.<strong>Security</strong> Server component is responsible for managing authentication and itcollaborates with the authorization engine and the user registry.<strong>Security</strong> collaborators<strong>Security</strong> collaborators are application server processes responsible for enforcingsecurity constraints specified in deployment descriptors. They communicate withsecurity server every time when authentication and authorization actions arerequired. The following security collaborators are identified:► Web security collaborator residing in the Web container.Web collaborator provides the following services to the application:– Checks authentication– Performs authorization according to the constraint specified in thedeployment descriptor– Logs security tracing information► EJB security collaborator residing in the EJB container.EJB collaborator uses CSIv2 and SAS to authenticate Java client requests toenterprise beans. It works with the security server to perform the followingfunctions:– Check authorizations according to the specified security constraint– Support communication with local user registry– Log security tracing information– Communicate external ORB using CSIv2 when a request for a remotebean is issuedJMX MBeansJava Management Extension Beans are used in <strong>WebSphere</strong> Application Server<strong>V5.0</strong> for management and administration related tasks. Please refer to 9.1.3,“Java Management Extension Architecture (JMX)” on page 220 for a moredetailed architecture view.Figure 9-7 briefly shows how these components interact in three differentcommunication scenarios.Chapter 9. <strong>WebSphere</strong> Application Server security 227

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!