13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.2 Web module securityIn a J2EE application architecture, the Web module of the enterprise applicationis comprised of one or more related servlets, Java Server Pages (JSP files), XMLand HTML files that can be managed as a one integrated unit. The files in theWeb module are related in the sense that they perform a common business logicfunction.The Web modules of the enterprise application run within the Web container ofthe application server. The Web container, as a runtime environment for the Webapplication, is responsible for handling requests for servlets, JSP files and othercomponents running on the server-side. The Web container creates servletinstances, loads and unloads servlets, creates and manages requests andresponse objects and performs other servlet management tasks. The Webserver plug-in provided by the <strong>WebSphere</strong> Application Server is responsible forredirecting the client’s request to the application server.This section describes the process and tools of <strong>WebSphere</strong> Application Server toconfigure security for the Web module of enterprise application.4.2.1 Configuring Web module securityOne of the tools used to configure security settings for a Web module is theApplication Assembly Tool (AAT).Authentication methodThe authentication method defines how the user will be authenticated by theWeb application. Before any authorization constraint is applied, the user willneed to pass the authentication process using a configured mechanism. Thepossible options are:►►►Basic authenticationThe user name and password are encoded by the browser and included inthe HTTP request. This mechanism does not provide server authentication.The Web server sends a request to the client, containing the realm name inwhich the user will be authenticated.Client certificate authenticationThe client certificate is transported across an SSL secured connection to theWeb server. The Web server then extracts the credentials from the certificateand forwards them to <strong>WebSphere</strong> along with the request.Form-based authentication46 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!