13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►If the startServer and stopServer scripts are started from the command linewith the username and password options, then <strong>WebSphere</strong> will start underthe supplied identity. For example:stopserver server1 -username -password It is also necessary to provide appropriate details to log in to the AdministrativeConsole. To gain access to the Administrative Console, the user must either:►►Log in as a user that is a member of one of the four <strong>WebSphere</strong>administrative roles (see 10.3, “Administrative roles” on page 239 for details).Log in under the identity supplied in the user registry panel.Figure 10-2 Administrative Console requires a valid administrative identity10.3 Administrative rolesThe J2EE role-based authorization concept has been extended to protect the<strong>WebSphere</strong> Administrative subsystem. Four roles are defined for performingadministrative tasks.Table 10-1 <strong>WebSphere</strong> Administrative rolesRolemonitorDescriptionLeast privileged; allows a user to view the<strong>WebSphere</strong> configuration and currentstate.Chapter 10. Administering <strong>WebSphere</strong> security 239

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!