13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.5 J2EE application security configurationThere are two aspects of application security administration which apply to allsecured J2EE application components: defining security roles (performed atapplication assembly time), and security role mapping (performed at deploymenttime). Additional application security administration tasks which apply to specificJ2EE components will be discussed in later chapters.Defining security roles can be performed using either of two <strong>WebSphere</strong> tools:► Application Assembly Tool► <strong>WebSphere</strong> Studio Application Developer<strong>Security</strong> role mapping can be performed using either of the above tools, or canbe performed using the <strong>WebSphere</strong> Administrative Console as part of theapplication installation.The following sections describe in detail how security roles are defined andmapped using each of these tools.Defining security roles in the Application Assembly ToolThis section will show how to define J2EE roles on the application level.Normally, roles are defined in the individual modules and then collectedautomatically into the application descriptor.It is still useful to define security roles for the application, when the applicationdesign and assembly follows the top-down design line or multiple assemblers areputting together the application and there is a lead assembler who conducts theassembly process. <strong>Security</strong> roles can be defined for the application and then beused on the module level; in this case, the application will not end up usingdifferent role names for the same role. Actually, in the <strong>WebSphere</strong> ApplicationAssembly Tool you can copy and paste roles back and forth between theapplication and its modules without creating them one by one.28 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!