13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

higher level of protection. User Data Constraint allows an application deployerto introduce such protection.If global security is enabled, and a security constraint is set for a particularresource, then the resource is secured.4.3 Securing Web componentsThis section presents simple scenarios on how to secure different Webcomponents. We assume that the roles are defined for the application as in theITSOBank sample application.4.3.1 Static contentStatic resources of the enterprise application can be secured only if they areserved by <strong>WebSphere</strong>. <strong>WebSphere</strong> cannot manage access to the static contentthat resides on the Web server. All the static content that needs to be protectedby <strong>WebSphere</strong> Application Server must be packaged into the Web module (.war,Web Archive file). Static HTML pages can be served by the servlet thatimplements file serving behavior.The following instructions show how to set up security constraint to protect staticcontent for the Web application module using the Application Assembly Tool.This section will only provide information for the Application Assembly Tool, sincesecuring static contents within <strong>WebSphere</strong> does not differ from securing dynamiccontent in <strong>WebSphere</strong>; the book will provide information for <strong>WebSphere</strong> studio inthe next section, where dynamic components will be secured.1. Start the Application Assembly Tool and load the ITSOBank sampleenterprise application archive file (itsobank.ear).2. Expand itsobank -> Web Modules -> itsobankWeb and select <strong>Security</strong>Constraints.3. Right-click <strong>Security</strong> Constraints and select New, a dialog window New<strong>Security</strong> Constraint will be opened.4. Enter the security constraint name Constraints for bank access. Click Addnext to the Roles area. You will be presented with a dialog box listing thesecurity roles that are defined for your application.5. Select Everyone and click OK. You should be presented with the followingwindow.50 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!