Security I - Welcome to: WebSphere Security IBM...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Welcome to: © Copyright IBM Corporation 2005 Course materials may not be reproduced in whole or in part without the prior written permission of IBM. WebSphere Security IBM Confidential
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
© Copyright IBM Corporation 2005 Unit Objectives This unit discusses: Authentication Supported user registries Delegation options Single sign on Authorization and J2EE security SSL WebSphere global security WebSphere Administrative Console security Java 2 security
Background image of page 2
© Copyright IBM Corporation 2005 This is the customer. The client can be either a single user PC or a whole company. The devices are specified when necessary. This is the router to the Internet. It typically provided by an ISP (Internet Service Provider). This model, however, can apply to a corporate Intranet. This router separates the internal network from the outside network. This is the company's Web server. It provides the universal access to the company's business logic. It allows browser access to the company's corporation. Above the Web server is the organization's company router/access device. This is the business logic. These applications have access to the databases and provide the company business rules. This is the company's data. Ultimately this is the information the company wishes to share with the customer. This data can be centralized or distributed. For this example, the data is accessed through business logic. Firewall Client Apps Data (Internet) Web Servers Basic No Security End-to-End Model Domain Firewall (DMZ) (Intranet)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
© Copyright IBM Corporation 2005 WebSphere Application Server Security Overview OS Security JVM Security Java2 Security CORBA Security J2EE SecurityAPI WebSphere Security *HTML *JSPs, Servlets, EJBs Platform Security Java Security WebSphere Security WebSphere Resources Security can be applied at different levels
Background image of page 4
© Copyright IBM Corporation 2005 WebSphere Security Service – Big Picture •Security service runs locally in each process (Deployment Manager, Node Agent, and Application Server) –Security workload not bottlenecked to a single process –Security service failure only affects a single process •Separation of authentication mechanism and user registry –Only one authentication mechanism and registry can be enabled at a time Node Agent Deployment Manager XML files Administrator App Server Security Service Security Service Security Service XML files App Server Security Service XML files Node Agent Security Service App Server Security Service XML files User Registry
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
© Copyright IBM Corporation 2005 Authentication and Access Control Authentication Who are you? Authorization What are you allowed to do? App Server Security Service XML files User Registry Web Container Web Container .ear A u t h e n i c a o r z
Background image of page 6
© Copyright IBM Corporation 2005 Client Server User Registry Authentication Basic Steps Request Challenge userid/pwd A u t h e n i c a o
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
© Copyright IBM Corporation 2005 Authentication Authentication: Tell a server who you are
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/09/2012 for the course COMPUTER S a303 taught by Professor None during the Spring '11 term at BEM Bordeaux Management School.

Page1 / 43

Security I - Welcome to: WebSphere Security IBM...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online