10.12.2012 Views

The Java EE 5 Tutorial (PDF) - Oracle Software Downloads

The Java EE 5 Tutorial (PDF) - Oracle Software Downloads

The Java EE 5 Tutorial (PDF) - Oracle Software Downloads

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Securing EIS Applications<br />

834<br />

Mapping an Application Principal to EIS Principals<br />

When using the Application Server, you can use security maps to map the caller identity of the<br />

application (principal or user group) to a suitable EIS principal in container-managed<br />

transaction-based scenarios. When an application principal initiates a request to an EIS, the<br />

Application Server first checks for an exact principal using the security map defined for the<br />

connector connection pool to determine the mapped back end EIS principal. If there is no exact<br />

match, then the Application Server uses the wild card character specification, if any, to<br />

determine the mapped back-end EIS principal. Security maps are used when an application<br />

user needs to execute EIS operations that require to be executed as a specific identity in the EIS.<br />

To work with security maps, use the Admin Console. From the Admin Console, follow these<br />

steps to get to the security maps page:<br />

1. Expand the Resources node.<br />

2. Expand the Connectors node.<br />

3. Select the Connector Connection Pools node.<br />

4. Select a Connector Connection Pool by selecting its name from the list of current pools, or<br />

create a new connector connection pool by selecting New from the list of current pools.<br />

5. Select the Security Maps page.<br />

<strong>The</strong> <strong>Java</strong> <strong>EE</strong> 5<strong>Tutorial</strong> • June 2010

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!