13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►Custom Tools developed by using Programmatic APIJMX Management API in <strong>WebSphere</strong> allows the user to create any resourceprogrammatically without using the GUI. Using this API, you may writeapplications that can perform the configuration of <strong>WebSphere</strong> ApplicationServer <strong>V5.0</strong>.Please refer to \web\apidocs\index.html for APIdocumentation for JMX Management.<strong>Security</strong> traceTo trace the security processes in <strong>WebSphere</strong> Application Server V5, enabletracing for <strong>WebSphere</strong> and set the following trace conditon, in addition to yourown settings:com.ibm.ws.security.*=all=enabled:SASRas=all=enabled:Once the server is restarted with the new settings, you will find a trace.log file inyour server’s log directory.10.2 <strong>WebSphere</strong> Global <strong>Security</strong>What does <strong>WebSphere</strong> mean by security? A secure application, for instance, willdemand certain information be presented before responding to a request forservice and if presented with a lack of appropriate information, will not beprepared to perform as requested. An application may consist of several parts, orcomponents, and <strong>WebSphere</strong> implements the means for securing each part.Chapter 4, “Securing Web components” on page 37, Chapter 5, “Securing EJBs”on page 73 and Chapter 6, “Securing Java clients” on page 97 cover how to startsecuring the common elements of a J2EE application and describe how theinformation necessary to access a secure service is gathered.<strong>Security</strong> is also required during communication between the service requestor,the client, and the service provider, the server. Configuring security, in this sense,can be a complex process. It is necessary to apply appropriate measures at eachpoint of a network and to ensure that they are functioning as required. Everycomponent in an end-to-end solution, from client to server, must be capable ofproviding enough security to ensure that information that passes through thatpoint cannot be compromised.Chapter 10. Administering <strong>WebSphere</strong> security 235

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!