13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

11.5 <strong>Security</strong> guidelines in Patterns for e-businessThe Patterns for e-business design approach also provides guidelines forsolution design. The guidelines consist of technology options, application designand development, security, performance and availability, and systemmanagement. The following short sections will point out some common securityguidelines that should be taken into consideration when designing an e-businesssolution.11.5.1 Securing connections in a solutionAt the architecture level, as opposed to the application level, connectionsbetween nodes should be secured. For information in relation with this topic, atthe application level, where secure connections should be ensured betweenmodules, refer to 3.1, “J2EE application” on page 22.The purpose of securing the communication is to prevent non-authorizedpersons and systems from listening to the communication or participating in theinteraction.Figure 11-9 shows the commonly used and highly recommended securecommunication lines between nodes.Outside WorldDemilitarized Zone(DMZ)Internal NetworkClientDirectory &<strong>Security</strong>ServerSSLRegistrydataHTTPSLDAPSLDAPSLDAPSIP NetworkProtocol firewallApplication HTTPSAuthenticationProxyServersHTTPS HTTPS HTTPS IIOP / SSLDomain firewallApplicationServerSSLExistingapplicationand dataSSLExistingapplicationand dataFigure 11-9 Secure connection between nodesChapter 11. <strong>Security</strong> in Patterns for e-business 365

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!