13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

11.4 Product mappingsThis section presents an example of Product mappings for the Runtime patternshown in Figure 11-7. We will focus only on the customer-based flow. We will notcover other flows that should be considered when working on a real life solution,such as an employees flow or a partners flow.11.4.1 Product mappings for the ITSOBank sample applicationProduct mappings used in the scenario are presented in Figure 11-8.Outside WorldNetscape / InternetExplorerClientDemilitarized Zone(DMZ)Tivoli AccessManager V3.9 onWindows 2000Tivoli AccessManager WebSEAL3.9 on Windows 2000Internal Network<strong>IBM</strong> SecureWayDirectory 3.2.2 onWindows 2000Directory &<strong>Security</strong>Server<strong>IBM</strong> DB2 UDB 7.2Workgroup Editionon Windows 2000RegistrydataIP NetworkProtocol firewallAuthenticationProxyDomain firewallApplicationServersApplicationServer<strong>IBM</strong> eNetworkFirewall 4.2 onWindows NT 4.0<strong>IBM</strong> eNetworkFirewall 4.2 onWindows NT 4.0Existingapplicationand data<strong>IBM</strong> DB2 UDB 7.2 FP5 Enterprise Edition onAIX 5L<strong>WebSphere</strong>Application ServerV5 on Windows 2000Lotus Domino 5.08aon Windows 2000Figure 11-8 Product mappings for ITSOBank application scenario362 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!