09.12.2012 Views

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index<br />

Numerics<br />

128-bit encryption algorithm 268<br />

40-bit encryption algorithm 268<br />

A<br />

administration security<br />

options 432<br />

do not enable security 437<br />

use a z/OS security product 433<br />

use a z/OS security product, user IDs created<br />

433<br />

use WAS security 435<br />

Administrative Console<br />

Accessing ITDS configuration 378<br />

administrative security 449<br />

Certificate<br />

manage certificate expiration 218<br />

change internal server user id 442<br />

Configuring the JVM for the SPNEGO TAI 416<br />

Develop your own TAI 396<br />

LDAP<br />

TDBM<br />

Federate Repositories 368<br />

z/OS LDAP SDBM 344<br />

z/OS LDAP TDBM 355<br />

RunAs thread identity 388<br />

SAF authorization 383, 385<br />

Security Attribute Propagation<br />

Vertical propagation 331<br />

security configuration reporting tool 448<br />

Security role-based<br />

AdminSecurityManager 461<br />

Deployer 461<br />

iscadmins 461<br />

security wizard 448<br />

SPNEGO configuration 414<br />

z/OS thread identity synchronization 387<br />

administrative roles<br />

added in WAS V6.1 460<br />

Administrator 461<br />

AdminSecurityManager 460<br />

Configurator 460<br />

Deployer 460<br />

iscadmins 460<br />

Monitor 460<br />

Operator 460<br />

administrative security 72<br />

default authorization provider 455<br />

disabling<br />

using admin console 457<br />

disabling, using wsadmin 457<br />

options 449<br />

security trace 458<br />

administrative security, fine-grained 462<br />

options to implement 463<br />

adminstrative security<br />

what does it protect? 72<br />

Application Security<br />

enabling, in admin console 73<br />

application security 72<br />

asymmetric cipher algorithm 30<br />

Auditing 4<br />

authDataAlias 48<br />

Authentication 3<br />

authentication keys 32<br />

Authorization 3<br />

Default authorization 384<br />

External authorization using JACC provider 385<br />

SAF authorization 384<br />

authorization group 462<br />

authorization providers 450<br />

default authorization 450<br />

Java Contract for Containers (JACC)<br />

external authorization 450<br />

System Authorization Facility (SAF) 450<br />

authorization, SAF-based 25<br />

B<br />

base64 254<br />

Basic Authentication 72, 98, 246<br />

Identity assertion 193<br />

basic authentication 51<br />

Binary Der Data 254<br />

C<br />

CA - Top Secret 228<br />

© Copyright <strong>IBM</strong> Corp. 2007. All rights reserved. 477

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!