13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8. Next to HTTP Methods click Add. You will be presented with the Add HTTPmethods dialog box.9. Add the GET and POST HTTP methods to the list.10.Next to URLs, click Add. You will be presented with the Add URLs entry box.11.Add the following URL patterns:/index.html/error/*/images/*/login/*/style/*Click OK.The final result of the resource collection for the security constraint definition isshown next.Figure 4-7 <strong>Security</strong> constraints resource collection definition4.3.2 Servlets and JSPs<strong>WebSphere</strong> Application Server can secure dynamic resources such as servletsusing role-based declarative security mechanisms. This means that the logicalapplication security structure is defined independently from the application itself.The logical security structure is stored in deployment descriptors of theapplication.52 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!