13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.1 J2EE applicationThe Java 2 Enterprise Edition (J2EE) specification defines the building blocksand elements of a J2EE application that build an enterprise application. Thespecification also provides details on security related to the different elements.The J2EE application consists of multiple modules and components; theseelements are in connection with each other, and they communicate via certainprotocols. This section only discusses the connection on the application level,without going into details about protocols.Figure 3-1 depicts most of the elements in a J2EE application and their relation.You can find several arrows indicating connections between elements; these arethe connections and connection groups that have to be secured in a J2EEapplication.ServletEntity EJBUserDatabaseUserBrowserClientHTML PageSession EJBJSP PageMessage EJBGroupApplicationClientMessagingMedia filesApplicationWeb ServicewwwLEGACYAPPLICATIONFigure 3-1 J2EE applicationFor example, a user accesses a JSP page on the application server; this JSP isa secured resource. In this situation, the application server has to authenticatethe user and decide whether the user is authorized to access the page or not. Inthis case, the connection between the user’s browser and the JSP page requiressecurity.22 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!