13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7. Save and close the web.xml file.Figure 4-11 Defining security roles references in StudioNote aboutroles visibility within the .ear file:Regarding roles, <strong>WebSphere</strong> 5 differs from <strong>WebSphere</strong> 4 on the topic of rolesvisibility. Each module can have independent logical roles. This means that ifwe define runtime roles on the application level, they do not roll down and arenot visible in any application module. However, roles defined for modules willroll up and be visible on the application level. This will allow the creation ofglobal references from the application down to the Web and EJB modules.4.5 Login facilitiesThe J2EE Specification defines the following types of authentication methods.► Basic authentication► Digest authentication► Form based authentication► Client Certificate based authenticationFor a brief description of each type of authentication, see 4.2.1, “ConfiguringWeb module security” on page 46.58 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!