13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►Configuration files for the Cell will be created and the configuration files forindividual servers will change.10.15.1 Configuring security for the cellThere are three levels in the application server organization in <strong>WebSphere</strong> fromthe configuration point of view (starting from the lowest organizational level):►►►Server: represents the application servers, JMS servers.Node: represents the node in the architecture, in the network. From theadministration point of view, the Node is responsible for managing themultiple servers on the Node.Cell: represents multiple nodes collected into one centrally managed unit.From the administration point of view, the Cell is responsible for managing themultiple nodes and servers in the Cell.<strong>Security</strong> configuration, just like other configurations, can be defined on theselevels. However, most of the settings apply to the server and cell level.AdministrationOnce a node is attached to a cell, the servers are running within the cell; they canonly be configured from the deployment manager. To configure any server in thecell, go to the URL https://:9090/admin, where is the host name of the deployment manager machine.<strong>Security</strong> configurations in a cellThe following table is a collection of security items and settings in a <strong>WebSphere</strong>cell. You can use the table for guidance, or you can specify certain settings andthe scope of these settings when administering a cell.Table 10-10 <strong>Security</strong> settings in a cellItem Cell Node Server Appl.Enabling global security X XEnabling Java 2 security X XUser registryAuthentication ProtocolXXCSIv2 protocol settings X X<strong>IBM</strong> SAS protocol settings X XJAAS Logon Modules configuration X (C)* X (A)**Chapter 10. Administering <strong>WebSphere</strong> security 339

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!