13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 5-4 Choosing security roles5. Click Next... to see the list of EJBs. Select one or more EJBs from the list.6. Click Next... to see the list of methods. Select one or more methods, usingthe wildcards (*) if desired to include all methods of a given type or allmethods for a given EJB.7. Click Finish when done.Assigning roles to unprotected methodsDuring application installation, the <strong>WebSphere</strong> Administrative Console allowsyou to specify what method permissions are applied to session and entity EJBmethods that are not explicitly secured in the deployment descriptor. If all sessionand entity EJB methods are protected, this step is omitted.Note: When assigning roles to EJB methods, methods can be specified usingseveral types of wildcards to select all home methods, local methods, localhome methods, remote methods, and so on. When installing an EJBcontaining methods that are protected using one method-type wildcard (forexample, the home methods wildcard) but whose other methods areunprotected, the <strong>WebSphere</strong> Application Server does not prompt for howunprotected methods are to be secured. Instead, they are deselected.Chapter 5. Securing EJBs 79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!