13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.4 Application deployment descriptorNote: This section contains information about deployment descriptorelements which pertain to all J2EE components. Descriptions and examplesof the deployment descriptor elements which pertain to specific J2EEComponents can be found in Chapter 4, “Securing Web components” onpage 37, and in Chapter 5, “Securing EJBs” on page 73.There are two deployment descriptor files used for security role mapping:Table 3-1 Role mappings in deployment descriptorsFile Name Purpose Mandatory?application.xml <strong>Security</strong> Roles Defined Yes.ibm-application-bnd.xmi <strong>Security</strong> Roles Mapped No. <strong>Security</strong> Roles can bemapped during or afterinstallationIn the application.xml file, all security roles used in the application must benamed, with an optional description. The following example shows the XMLelements required to define six security roles: manager, consultant, clerk,accountant, allauthenticated, and everyone.Example 3-1 <strong>Security</strong> role definitions in application.xmlITSOBank managermanagerITSOBank consultantconsultantITSOBank clerkclerkITSOBank accountantaccountantAll authenticated usersallauthenticated26 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!