13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10.Ensure the Client Authentication is enabled. This is optional and is enabled inthis example.11.Ensure the <strong>Security</strong> Level is set to High.12.Ensure that the Cryptographic Token box is not selected.13.It is not necessary to provide any custom properties. Click OK.14.Save the changes to the master configuration by selecting the link at the topof the window.The password is stored in a file called security.xml in/config/cells/ and is protected with an Base64ASCII encoding.Example 10-4 Excerpt from security.xmlNote: Although the password appears as a series of asterisks in the Adminconsole, it will be stored in an easily readable string in the repository. It is asimple task for an eavesdropper to decode this string and recover thepassword and so it is important to protect the respository from unauthorizedusers.The appropriate <strong>WebSphere</strong> components may now be set to use thenewly-defined SSL configuration. It might also be necesary to configure somenon-<strong>WebSphere</strong> components, such as a Web server, in order to ensure a secureconnection between all components. Typically, a digital certificate will be createdfor each component. In a Web server scenario, for instance, the <strong>WebSphere</strong>server will own a certificate and the Web server will own another. The certificateswill identify the particular component by which they are owned.Chapter 10. Administering <strong>WebSphere</strong> security 277

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!