13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4. Fill out the fields according to the following screen capture.Figure 4-5 New role for the Web module5. Click OK.6. Repeat the steps above to create all the necessary roles for the Web module.7. Save the .ear file.Defining security constraintsProviding an authentication mechanism for global application security does notprovide the mechanisms to control access to the Web resources.<strong>Security</strong> constraints declare how the content of the application is protected. For agiven security constraint, three things should be defined:►►►One or more Web resources that define actual application components thatare to be protected by the security constraint. Web resource is a set of URLpatterns and HTTP methods in those resources. All requests that will bematched with the pattern defined for a given Web resource will be subject to asecurity constraint.An authorization constraint that defines roles which will be provided access tothe Web resources existing within the security constraint. An authorizationconstraint is a set of roles that the user must be granted in order to haveaccess to a Web resource collection existing within a security constraint. Inorder to have access to the Web resource, the user should be granted at leastone of the roles that are defined within the Authorization constraint.Used Data Constraint indicates the transport layer setting for client/servercommunication in order to satisfy given security constraint. This settingshould guarantee either content integrity (preventing tampering in transit) orconfidentiality (preventing reading data during transfer). User Data Constraintmay override standard security settings for the application. For example,access to some functions of the application may require just basic login usinga user ID and password, and at the same time some functions may require aChapter 4. Securing Web components 49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!