29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

12.4 Planning checklist for security<br />

Table 12-2 provides a summary of items to consider as you plan, and additional<br />

resources that can help you.<br />

Table 12-2 Planning checklist for Web services<br />

Planning item<br />

Determine when and how you will enable <strong>WebSphere</strong> <strong>Application</strong> Security.<br />

Create a strategy for administrative security.<br />

Plan for auditing.<br />

Determine if multiple security domains will be used.<br />

Determine the type of user registry you will use and procure the appropriate products<br />

and licenses. If you do not want to use a federated repository, delay turning on<br />

administrative security until after installation. Populate the user registry with the<br />

appropriate user IDs and groups for initial security.<br />

Determine the authentication mechanism (LTPA is strongly suggested).<br />

Determine the authorization method (default or JACC). If using JACC, plan for the<br />

implementation of the JACC provider.<br />

Plan where you will implement SSL in your network.<br />

Plan for certificate management.<br />

Plan for single sign-on.<br />

Create a strategy for securing applications using Java EE security. Choose either<br />

declarative or programmatic. If selecting declarative, then should annotations be used<br />

or not? <strong>Application</strong> security requires close cooperation between application developers,<br />

security specialists, and administrators. Plan for coordinating role definitions with<br />

development and assigning users to roles during the application installation. Determine<br />

individual application components that have special security requirements.<br />

Review and incorporate security strategies for Web services.<br />

Review and incorporate security strategies for the service integration bus.<br />

Chapter 12. Security 405

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!