29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

12.2.6 Auditing<br />

<strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong> introduces a new feature as part of its<br />

security infrastructure: the security auditing subsystem.<br />

Security auditing has two primary goals:<br />

► Confirming the effectiveness and integrity of the existing security<br />

configuration (accountability and compliance with policies and laws)<br />

► Identifying areas where improvement to the security configuration might be<br />

needed (vulnerability analysis)<br />

Security auditing achieves these goals by providing the infrastructure that allows<br />

you to implement your code to capture and store supported auditable security<br />

events. During run time, all code (except the Java EE 5 application code) is<br />

considered to be trusted. Each time a Java EE 5 application accesses a secured<br />

resource, any internal application server process with an audit point included can<br />

be recorded as an auditable event.<br />

If compliance with regulatory laws or organizational policies have to be proved,<br />

you can enable auditing and configure filters to log the events you are interested<br />

in according to your needs.<br />

The security auditing subsystem has the ability to capture the following types of<br />

auditable events:<br />

► Authentication<br />

► Authorization<br />

► Principal/credential mapping<br />

► Audit policy management<br />

► Administrative configuration management<br />

► User registry and identity management<br />

► Delegation<br />

These events are recorded in signed and encrypted audit log files in order to<br />

ensure its integrity. Encryption and signing of audit logs are not set by default,<br />

though we suggest its use to protect those records from being altered. You will<br />

have to add keystores and certificates for encryption and signing.<br />

Log files can be read with the audit reader, a tool that is included in <strong>WebSphere</strong><br />

<strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong> in the form of a wsadmin command. For example, the<br />

following wsadmin command line returns a basic audit report:<br />

AdminTask.binaryAuditLogReader('[-fileName myFileName -reportMode basic<br />

-keyStorePassword password123 -outputLocation /binaryLogs]')<br />

Chapter 12. Security 401

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!