13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

These unprotected methods can have one of three permissions applied:1. Uncheck. This is the default, and indicates that unprotected methods shouldbe left unprotected. Anyone can call these methods.2. Exclude. Unprotected methods are unavailable to all callers.3. Role. Unprotected methods are available only to members of a specificsecurity role.Figure 5-5 Assigning roles to unprotected EJB methodsNote: This behavior is different than in previous <strong>WebSphere</strong> versions. In<strong>WebSphere</strong> Application Server Version 4, the default was to grant access toall EJB methods when no methods were explicitly protected, and to denyaccess to all EJB methods (by default) when at least one EJB method wasprotected.Most importantly, the default in Version 5 is for methods that are not explicitlyunprotected to be unchecked.5.4 <strong>Security</strong> role references<strong>Security</strong> role references are used to provide a layer of indirection betweensecurity roles named in EJB Java code and security roles that are defined atapplication assembly time. This allows security roles names to be modifiedwithout requiring changes in the application code.80 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!