13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Security</strong> role mapping in the Administrative Console<strong>Security</strong> role mapping can be performed from the <strong>WebSphere</strong> Administrativeconsole during application installation, or at any time once the application hasbeen installed.Note: This section assumes that the user registry is set and configured forLDAP. For more information on user registry settings, refer to Section 10.4,“Configuring a user registry” on page 244.When installing an application using the <strong>WebSphere</strong> Administrative Console, oneof the installation steps is to verify or define security role mapping. If security rolemapping has been previously defined in the application’s deployment descriptor,the console will display that mapping and allow it to be modified.Note: If no security roles are defined in the application deployment descriptor,this step is omitted from the application installation steps.After an application has been installed, the security role mapping console can beaccessed by following these steps:1. Click Applications -> Enterprise Applications.2. Click the name of the application you wish to modify.3. Under Additional Properties, click Map security roles to users/groups.The <strong>Security</strong> Role mapping console appears as shown in Figure 3-6 on page 33.In this example, the manager role is mapped to managergrp, the clerk,consultant, accountant roles are also mapped to the according groups; themdbuser role is mapped to a user, mdbuser; the allauthenticated role is mappedto the All Authenticated special subject; and the everyone role is mapped to theEveryone special subject.Note: Assign the special subjects All Authenticated and Everyone as the lastsetting before you click Next; you will then not lose these settings when youlook up users or groups.32 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!