29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Users<br />

Fred<br />

Sally<br />

Mike<br />

Figure 12-4 User role mapping<br />

Security Roles<br />

Accountant<br />

Manager<br />

Clerk<br />

This two-phase approach to security gives a great deal of flexibility because<br />

deployers and administrators have control over how their users are mapped to<br />

the various security roles.<br />

Security for Java EE resources<br />

Java EE containers enforce security in two ways:<br />

► Declarative security<br />

► Programmatic security<br />

Declarative security<br />

Declarative security is the means by which an application’s security policies can<br />

be expressed externally to the application code. At application assembly time,<br />

security policies are defined in an application deployment descriptor. A<br />

deployment descriptor is an XML file that includes a representation of an<br />

application’s security requirements, including the application’s security roles,<br />

access control, and authentication requirements. When using declarative<br />

security, application developers can write component methods that are<br />

completely unaware of security. By making changes to the deployment<br />

descriptor, an application’s security environment can be radically changed<br />

398 <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong>: <strong>Concepts</strong>, Planning, and Design<br />

EJB Methods<br />

Web Resources<br />

JSPs<br />

Servlets<br />

HTML

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!