29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

These components consist of the following technologies:<br />

► <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> security<br />

<strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> security enforces security policies and<br />

services in a unified manner on access to Web resources, enterprise beans,<br />

Web services, and JMX administrative resources. It consists of <strong>WebSphere</strong><br />

<strong>Application</strong> <strong>Server</strong> security technologies and features to support the needs of<br />

a secure enterprise environment.<br />

► Java platform security<br />

– Java Platform, Enterprise Edition (Java EE) security API<br />

The security collaborator enforces Java EE-based security policies and<br />

supports Java EE security APIs.<br />

– CSIv2 CORBA security<br />

Any calls made among secure Object Request Brokers (ORBs) are<br />

invoked over the Common Secure Interoperability Version 2 (CSIv2)<br />

security protocol, which sets up the security context and the necessary<br />

quality of protection. After the session is established, the call is passed up<br />

to the enterprise bean layer. CSIv2 is an IIOP-based, three-tiered, security<br />

protocol that is developed by the Object Management Group (OMG). This<br />

protocol provides message protection, interoperable authentication, and<br />

delegation. The three layers include a base transport security layer, a<br />

supplemental client authentication layer, and a security attribute layer.<br />

Note: Secure Authentication Service (SAS) security protocol is only<br />

supported between <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> V6.0 and previous<br />

version servers that have been federated in a Version 7.0 cell. In future<br />

releases, <strong>IBM</strong> will no longer ship or support the SAS IIOP security<br />

protocol.<br />

– Java security<br />

The Java security model offers access control to system resources<br />

including file system, system property, socket connection, threading, class<br />

loading, and so on. <strong>Application</strong> code must explicitly grant the required<br />

permission to access a protected resource.<br />

– Java virtual machine (JVM) 6.0<br />

The JVM security model provides a layer of security above the operating<br />

system layer. For example, JVM security protects the memory from<br />

unrestricted access, creates exceptions when errors occur within a thread,<br />

and defines array types.<br />

384 <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong>: <strong>Concepts</strong>, Planning, and Design

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!