13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Outside WorldDemilitarized Zone(DMZ)Internal NetworkPublic KeyInfrastructureDirectory &<strong>Security</strong>ServerRegistrydataIP NetworkProtocol firewall<strong>Security</strong>ProxyDomain firewallApplicationServersClientExistingapplicationand dataClientTierSingleSign-OnApplication 1Application 2Figure 11-5 Web Single Sign-On (heterogeneous applicaiton servers) runtime patternAnother decision that was made was to use credential propagation from theWeb-tier down to the business logic tier and back-end applications. This willenable non-repudiation of back-end transactions initiated by Web users. We canachieve this by using the same security server to manage the Web tier andbusiness logic and back-end applications. No credential mapping ortransformation is required; this might be an option if separate securitymechanisms were used in different application tiers. The security context ispresented all the way from the Web down to the back-end resources.This approach significantly simplifies users’ and policy management by unifyingthe user profile across the entire business process supported by the Webapplication. It doeas requires some complex configurations and usage of securityservers that are supported by the chosen application servers.Chapter 11. <strong>Security</strong> in Patterns for e-business 359

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!