13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 4-4 Login Method Configuration for itsobank application<strong>Security</strong> roles<strong>WebSphere</strong> implements the roles-based security from the J2EE Specification.<strong>Security</strong> role is a logical grouping of principals. Access to a specific part of theapplication is granted based on the role, which is then mapped during thedevelopment or deployment phase to specific user registry entries. It gives acertain level of transparency to the application development process. Thedeveloper need not bother about the different user privileges that can be definedfor the application.The security roles for the ITSOBank application are defined in Appendix A,“Sample application” on page 445. As noted there, security roles defined for aWeb module are visible at the Enterprise application level. The following stepswill describe how to define a role for the Web module with the ApplicationAssembly Tool.1. Open the itsobank.ear file in the Application Assembly Tool.2. Right-click itsobank -> Web Modules -> itsobankWeb -> <strong>Security</strong> Rolesitem.3. Select New from the pop-up menu.48 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!