13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8. Add the GET and POST HTTP methods to the list.9. Next to URLs, click Add. You will be presented with the Add URLs entry box.10.Add the following URL patterns:/transfer/customertransfer.html/transfer/transferresults.jsp/serlvets/TransferClick OK.The final result of the resource collection for the security constraint definition isshown next.Figure 4-8 <strong>Security</strong> constraints resource collection definitionSecuring components using <strong>WebSphere</strong> StudioThe approach to defining security constraints in <strong>WebSphere</strong> Studio ApplicationDeveloper is very similar to the one described above. In order to perform thesame task for Transfer servlet security constraint, follow these steps:1. Open or select the J2EE perspective, and switch to the J2EE Hierarchy view.2. Open the Web Modules folder, then double-click the itsobankWeb item. Thiswill open the editor with the Web deployment descriptor. Switch to the<strong>Security</strong> tab.3. Define a new security constraint, select <strong>Security</strong> Constraints tab at the topof the editor, then click the Add button under the <strong>Security</strong> Constraints window54 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!