13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10.6 LTPA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25010.6.1 Single Sign-On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25110.6.2 Configuring LTPA for <strong>WebSphere</strong>. . . . . . . . . . . . . . . . . . . . . . . . . 25210.6.3 Generating LTPA keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25310.6.4 Enabling LTPA authentication for <strong>WebSphere</strong> . . . . . . . . . . . . . . . 25410.7 JAAS configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25510.7.1 Application login information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25510.7.2 J2C Authentication data entries . . . . . . . . . . . . . . . . . . . . . . . . . . 25710.8 Configuring SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25810.8.1 SSL configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25910.9 Demo keyfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26110.9.1 Generating a self-signed certificate. . . . . . . . . . . . . . . . . . . . . . . . 26410.9.2 Requesting a certificate signed by a CA . . . . . . . . . . . . . . . . . . . . 27110.9.3 Using the Java keytool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27610.9.4 Configuring <strong>WebSphere</strong> to use a key store . . . . . . . . . . . . . . . . . 27610.10 SSL between the Web client and the Web server. . . . . . . . . . . . . . . . 27810.10.1 Generating a digital certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . 27910.10.2 Configuring the <strong>IBM</strong> HTTP Server . . . . . . . . . . . . . . . . . . . . . . . 28110.10.3 Client-side certificate for client authentication. . . . . . . . . . . . . . . 28910.11 SSL between the Web server and <strong>WebSphere</strong>. . . . . . . . . . . . . . . . . . 30210.12 SSL between the Java client and <strong>WebSphere</strong> . . . . . . . . . . . . . . . . . . 31010.12.1 Creating the key stores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31010.12.2 Server side configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31110.12.3 Configuring the Java client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31510.13 Connecting to directory servers (LDAP) . . . . . . . . . . . . . . . . . . . . . . . 31710.13.1 <strong>IBM</strong> SecureWay Directory Server V3.2.2 . . . . . . . . . . . . . . . . . . 31810.14 JMX MBean security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33610.15 Cell <strong>Security</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33710.15.1 Configuring security for the cell. . . . . . . . . . . . . . . . . . . . . . . . . . 33910.15.2 Configuring security for an individual server . . . . . . . . . . . . . . . . 342Part 2. End-to-end security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347Chapter 11. <strong>Security</strong> in Patterns for e-business. . . . . . . . . . . . . . . . . . . . 34911.1 Patterns for e-business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35011.1.1 Business patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35011.1.2 Integration patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35111.1.3 Composite patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35111.1.4 Patterns and the solution design process . . . . . . . . . . . . . . . . . . . 35211.2 Selecting Application patterns for ITSOBank . . . . . . . . . . . . . . . . . . . . 35311.2.1 Application pattern for Self-Service business pattern . . . . . . . . . . 35311.2.2 Application pattern for the Access Integration pattern . . . . . . . . . 35411.3 Creating the Runtime pattern for the ITSOBank application . . . . . . . . . 356vi<strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!