13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 3-7 Searching for the manager group4. Click OK to accept the changes and close the group lookup window.5. Click OK to accept and close the <strong>Security</strong> role mapping window.6. Save the <strong>WebSphere</strong> configuration to make the changes effective.3.6 Modifying applicationsThis section discusses two simple scenarios:► Modifying the security role mapping for an enterprise application afterdeployment.► Redeploying a secure application.Modifying the security role mappingThere are certain situations when role mapping needs to be changed afterdeployment or cannot be performed during deployment. <strong>WebSphere</strong> ApplicationServer V5 lets the administrator perform the security role mapping on a deployedapplication using the Administrative Console.34 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!