29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

► Kerberos (KRB5) authentication mechanism<br />

Although not available in the base release of <strong>V7.0</strong>, support for Kerberos as an<br />

authentication mechanism will be included in a future release.<br />

► Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) Web<br />

authentication<br />

SPNEGO Web authentication has been introduced as a substitute for<br />

SPNEGO TAI. It can be configured by using the Integrated Solutions Console.<br />

It allows the dynamic reload of SPNEGO without the need of a server restart.<br />

12.2 Security in <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong><br />

The fundamental reason for having security in your systems is to protect them<br />

from intruders (external or internal to your organization) and to ensure that there<br />

is no accidental or intentional misuse of your systems or the data flowing through<br />

your systems.<br />

When planning security for <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong>, it is important to have<br />

a comprehensive security policy in place that coordinates neatly with the overall<br />

environment security. <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> adheres to standard Java<br />

Enterprise Edition (Java EE) specifications and integrates with existing security<br />

systems. There is no single solution for security concerns. However, proper<br />

planning and diligence can keep systems functional and minimize the impact on<br />

business.<br />

Security can be divided into the following areas:<br />

► Physical security<br />

Physical security encompasses the area where the environment is located.<br />

The major concerns are access to the site and protection against<br />

environmental conditions. Commonly, such areas are physically secured and<br />

access is limited to a small number of individuals.<br />

► Logical security<br />

Logical security includes the mechanisms provided to protect systems and<br />

applications from having unauthorized accesses through the system console<br />

or through the network. User authentication is the most common logical<br />

security mechanism but there are others like encryption, certificates, or<br />

firewalls.<br />

Chapter 12. Security 381

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!