29.01.2013 Views

WebSphere Application Server - IBM Redbooks

WebSphere Application Server - IBM Redbooks

WebSphere Application Server - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

16.1 Terms<br />

Before starting this topic, take a minute to review the following security terms:<br />

► Authentication: The process of establishing whether a client is valid in a<br />

particular context. A client can be an end user, a machine, or an application.<br />

Typically you would think of this as a login process.<br />

► Authorization: The process of checking whether the authenticated user has<br />

access to the requested resource.<br />

► Principal: an entity in the computer system to which permissions are granted.<br />

► Realm: A collection of users that are controlled by the same authentication<br />

policy.<br />

As we discuss the security options in <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> - Express,<br />

you will see these terms and should have an understanding of what they mean.<br />

16.2 Securing applications in <strong>WebSphere</strong> <strong>Application</strong><br />

<strong>Server</strong> - Express<br />

Implementing security in <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> - Express is relatively<br />

easy. The basic steps needed to secure your applications are:<br />

► Determine the authentication method.<br />

► Determine the actions that you want to restrict and define a scheme of roles<br />

that can be used for authorization purposes. If you simply want to restrict<br />

access to certain pieces of JSP or servlet code, you can do this without<br />

changing any application code. For more advanced techniques, you can<br />

introduce code in your application that will perform authorization before<br />

allowing the user to perform certain actions.<br />

► Define users and groups to the <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> - Express<br />

operating system and assign those users and groups to the roles you have<br />

defined.<br />

► Enable <strong>WebSphere</strong> security and/or code applications to implement security.<br />

552 <strong>IBM</strong> <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> - Express V5.0.2 Developer Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!