29.01.2013 Views

WebSphere Application Server - IBM Redbooks

WebSphere Application Server - IBM Redbooks

WebSphere Application Server - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

16.4 Securing applications with role-based security<br />

<strong>Application</strong> security is implemented using J2EE role-based security. Security<br />

roles provide a mechanism whereby application developers determine the<br />

security policies for an application by creating named sets of users (for example,<br />

managers, customers, employees) that will have access to secure resources and<br />

methods.<br />

At application development time, these sets of users, or security roles, are not<br />

tied to any real users or groups of users. Instead, they are placeholders that are<br />

later mapped to real users and groups at application deployment time, during a<br />

process called security role mapping.<br />

Principals and Groups<br />

Daffa<br />

Iza<br />

Department XYZ<br />

Figure 16-2 Security roles<br />

Security Role<br />

Mapping<br />

Security Roles<br />

Manager<br />

Consultant<br />

Accountant<br />

This two-phase security administration approach allows for a great deal of<br />

flexibility and portability. Deployers of an application have full control over how<br />

their local users and groups are mapped to the application’s security roles, and<br />

over what authorization and authentication mechanisms are used to determine<br />

role membership.<br />

556 <strong>IBM</strong> <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> - Express V5.0.2 Developer Handbook<br />

Staff<br />

Web Component Resources<br />

JSPs<br />

Servlets<br />

Static Content

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!