13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Principals and Groups<strong>Security</strong> RolesEJB MethodsFredManagerConsultantMary<strong>Security</strong> RoleMappingAccountantWeb Component ResourcesJSPsServletsDepartment XYZStaticContentClerkFigure 3-2 <strong>Security</strong> rolesThis two-phase security administration approach allows for a great deal offlexibility and portability. Deployers of an application have full control over howtheir local users and groups are mapped to the application’s security roles, andover what authorization and authentication mechanisms are used to determinerole membership.At deployment time, security roles can be mapped to users, groups of users, orspecial subjects. There are two special subjects in <strong>WebSphere</strong> Version 5:► All Authenticated Users► Everyone24 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!