13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.2 <strong>Security</strong> fundamentals2.2.1 AuthenticationThis section will discuss two fundamental security services also supported by<strong>WebSphere</strong> Application Server:► Authentication► AuthorizationAuthentication is the process of establishing whether a client is valid in aparticular context. A client can be either an end user, a machine or anapplication.Definition: A realm is a collection of users that are controlled by the sameauthentication policy.The authentication process involves gathering some unique information from theclient.There are three major groups of secure authentication used to gather this uniqueinformation:► Knowledge-based - user name and password, for example.► Key-based - physical keys, encryption keys, key cards.► Biometric - finger prints, voice patterns or DNA.Other authentication mechanisms can combine these; an example is digitalcertificates, where key-based and knowledge-based authentication areexercised.8 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!