29.01.2013 Views

WebSphere Application Server - IBM Redbooks

WebSphere Application Server - IBM Redbooks

WebSphere Application Server - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 15. Development in a team environment . . . . . . . . . . . . . . . . . . 515<br />

15.1 Team development with CVS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516<br />

15.1.1 Non-exclusive checkout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516<br />

15.1.2 Access to resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516<br />

15.1.3 Working with resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516<br />

15.1.4 Change history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517<br />

15.1.5 Making changes available to the team . . . . . . . . . . . . . . . . . . . . . 517<br />

15.1.6 Conflict resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517<br />

15.2 Team environment using Studio Site Developer . . . . . . . . . . . . . . . . . . 518<br />

15.2.1 Typical flow for team development . . . . . . . . . . . . . . . . . . . . . . . . 518<br />

15.3 Connecting to a repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519<br />

15.4 Adding a new application to the repository . . . . . . . . . . . . . . . . . . . . . . 521<br />

15.4.1 Sharing the project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521<br />

15.4.2 Copy (commit) the project to the repository . . . . . . . . . . . . . . . . . 524<br />

15.4.3 Creating a version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525<br />

15.4.4 (Optional) changing the sharing information for a Web project. . . 528<br />

15.5 Adding an existing application to your workspace. . . . . . . . . . . . . . . . . 529<br />

15.6 Working with the team using the repository . . . . . . . . . . . . . . . . . . . . . 530<br />

15.6.1 Synchronizing with the repository . . . . . . . . . . . . . . . . . . . . . . . . . 530<br />

15.6.2 Dealing with conflicting changes . . . . . . . . . . . . . . . . . . . . . . . . . . 531<br />

15.6.3 Updating from the repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535<br />

15.6.4 Committing changes to the repository. . . . . . . . . . . . . . . . . . . . . . 536<br />

15.7 Using multiple branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537<br />

15.7.1 Creating a new branch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537<br />

15.7.2 Accessing the branch from another workbench . . . . . . . . . . . . . . 539<br />

15.7.3 Merging branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541<br />

15.8 Viewing resource history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542<br />

15.9 Comparing resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544<br />

15.9.1 Comparing a resource. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545<br />

15.9.2 Comparing two selected files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545<br />

15.9.3 Three-way compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545<br />

15.9.4 Working with the comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547<br />

15.10 Determining which files are managed . . . . . . . . . . . . . . . . . . . . . . . . . 549<br />

Chapter 16. Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551<br />

16.1 Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552<br />

16.2 Securing applications in <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> - Express . . . 552<br />

16.3 Authenticating users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553<br />

16.3.1 Form-based authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554<br />

16.4 Securing applications with role-based security . . . . . . . . . . . . . . . . . . . 556<br />

16.4.1 Declarative security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557<br />

16.4.2 Programmatic security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568<br />

16.5 JAAS security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570<br />

Contents ix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!