29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

12.2.2 Authorization<br />

Trust associations<br />

Web clients can also authenticate by using a Trust Association Interceptor (TAI).<br />

Trust association enables the integration of <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong><br />

security and third-party security servers. More specifically, a reverse proxy server<br />

can act as a front-end authentication server while the product applies its own<br />

authorization policy onto the resulting credentials passed by the reverse proxy<br />

server.<br />

Demand for such an integrated configuration has become more compelling,<br />

especially when a single product cannot meet all of the client needs or when<br />

migration is not a viable solution. In this configuration, <strong>WebSphere</strong> <strong>Application</strong><br />

<strong>Server</strong> is used as a back-end server to further exploit its fine-grained access<br />

control. The reverse proxy server passes the HTTP request to the <strong>WebSphere</strong><br />

<strong>Application</strong> <strong>Server</strong> that includes the credentials of the authenticated user.<br />

<strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> then uses these credentials to authorize the<br />

request.<br />

Note: SPNEGO TAI has been deprecated in <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong><br />

<strong>V7.0</strong>.<br />

Authorization is the process of checking whether a given user has the privileges<br />

necessary to get access to a requested resource. <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong><br />

supports many authorization technologies:<br />

► Authorization involving the Web container and Java EE technology<br />

► Authorization involving an enterprise bean application and Java EE<br />

technology<br />

► Authorization involving Web services and Java EE technology<br />

► Java Message Service (JMS)<br />

► Java Authorization Contract for Containers (JACC)<br />

Java Authorization Contract for Containers<br />

<strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong> supports both a default authorization<br />

provider, and, alternatively, an authorization provider that is based on the Java<br />

Authorization Contract for Containers (JACC) specification. The JACC-based<br />

authorization provider enables third-party security providers to handle the Java<br />

EE authorization.<br />

392 <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong>: <strong>Concepts</strong>, Planning, and Design

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!