13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IndexAAccess Control 18List 10Access control 74Access ManagerADK 440Advanced LDAP Settings 384Application Developer Kit 440authorization API 440Authorization Server 432aznAPI 440Create users 419Creating ACLs 424Creating groups 416Creating junctions 422LDAPS 384Migrating <strong>WebSphere</strong> applications 436Point products 376Policy Master 432Policy Server 375query_contents 411Scenarios 378Secure Domain 374Shared user registries 380Web Portal Manager 376WebSEAL 376<strong>WebSphere</strong> Edge Server plug-in 410<strong>WebSphere</strong> plug-in 431installation 434Accountability 18Acquiring a personal certificate 299Administration 18Administrative ConsoleAdministrative roles 239Application login 255ConsoleGroups 241Users 240CORBA Naming ServiceGroups 244Users 243CSIv2 311Custom TAI 192Generating LTPA Keys 253Global <strong>Security</strong> 235–236J2C Authentication data entries 257JAAS 255JAAS Login Modules 256LDAP 317, 334LDAP Testing 248LDAP user registry 325LTPA 252Run-as mapping 93SAS 314<strong>Security</strong> Trace 235SSL 258User Registry 464, 472User registry 244<strong>WebSphere</strong> MQ JMS Provider 166ApplicationMigration (Access Manager) 436Application Assembler 2Application Assembly ToolFilter configuration 68Form based login 60J2EE roles 75Method permissions 77Method-level Run-as delegation policies 89Run-as delegation policies 85Securing static content 50<strong>Security</strong> constraints 53<strong>Security</strong> Role References 56<strong>Security</strong> role references 81<strong>Security</strong> roles 28Web module 47Application clientActiveX application 98Applet 98Compare clients 99J2EE application 98Models 98Pluggable application 99Thin application 99Application deploymentRun-as mapping 93Application designer’s approach 2Application modules 22© Copyright <strong>IBM</strong> Corp. 2002 529

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!