13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ClientTierSingleSign-OnApplication 1<strong>Security</strong>IntegrationEnterpriseApplicationApplication 2Figure 11-3 Access Integration::Extended Single Sign-On application patternThe Extended Single Sign-On application pattern enhances the Web SingleSign-On application pattern with propagation of the security context. In the WebSingle Sign-On application pattern, sign-on functions are performed in Web tier.In Extended Single Sign-On, as shown in Figure 11-3, sign-on functions areexternalized and almost always based on central user registry. This introducesmore flexibility in fulfilling privacy and security auditing requirements.The main drivers that directed our decisions were:► Users will have seamless access to <strong>WebSphere</strong> and Domino basedapplications and data without being prompted for a login name and passwordby each application separately.►►►An external authentication and authorization system will authenticate the userand set up a security context that can be propagated through the entirebusiness process from the Web tier down to the business logic and back-endtier.Reduced maintenance and administration costs for authentication andauthorization system, thanks to the centralization of the user registry andsecurity policy database.Reduced total cost of ownership, thanks to the simplification and improvedefficiency of the users' and security policy management.The following tiers can be distinguished in this pattern:► Client tier: similar to the Directly Integrated Single Channel applicationpattern, this tier represents end user interface used to interact with theapplication. In the case of ITSObank, it will be a Web browser interface.►Single Sign-on tier: from a security point of view, the main component of thesolution design. It is responsible for authenticating users and establishingsecurity credentials, as well as ensuring seamless sign-on capability acrossmultiple applications. In this tier, security administration and policies areimplemented. Sign-On tier uses centralized users' and policy database. In thecase of ITSOBank, it is an LDAP server user registry.Chapter 11. <strong>Security</strong> in Patterns for e-business 355

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!