13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

►certificates, access groups, etc. This node supplies the information to thesecurity services the authentication and authorization service.The existing application and data node depicts the back-end systems anddatabases that are accessible from the Web application.For a more detailed description of Runtime pattern variation for the Self-Serviceapplication pattern, please refer to 11.6, “More information on Patterns fore-business” on page 367.11.3.2 Runtime pattern for Access Integration:: Extended SingleSign-On application patternThe key consideration in choosing a Runtime pattern for Single Sign-On solutionis diversity of e-business environment, types of application servers used andsecurity management.We have made a decision to use two different application servers for differentfunctions of the application. This implies that we need to have an externalsecurity server that will serve as a security proxy, which intercepts a request inorder to map/transform user’s credentials into the appropriate credential formatacceptable to application servers. To support this part of our design, we can usethe Runtime pattern for heterogeneous servers with external authentication andauthorization servers, presented in Figure 11-5.358 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!