13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ManagementServerAccess Manager DMZPolicy Store<strong>Security</strong> ProxyUser RegistryCustomersWebSeal ReverseProxyAuthenticationAuthorizationAuditAuthorizationServerWeb PortalManagerInternetWeb Server<strong>WebSphere</strong>Application ServerAuthorizationAuditMiddlewareApplication ServerAuthorizationAuditBack OfficeSystemsAuthorizationInternet DMZ Region 1 DMZ Region 2 IntranetFigure 12-1 Typical three-tier infrastructure supporting e-business applicationsAccess Manager requires a User Registry and can be configured to use manyproducts, including Microsoft Active Directory and iPlanet, but ships with <strong>IBM</strong>SecureWay LDAP Directory V 3.2.2, underpinned by the <strong>IBM</strong> DB2 UniversalDatabase.The Access Manager Policy Server maintains the master authorization policydatabase which contains the security policy information for all resources and allcredentials information of all participants within the secure domain, both usersand servers. A secure domain contains physical resources requiring protection.These resources include programs, files and directories. A virtual representationof these resources, protected by attaching ACL and POP policies, is stored bythe Policy Server.Chapter 12. Tivoli Access Manager 375

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!