IBM WebSphere application server V7.0 security [[electronic resource] ] : secure your WebSphere applications with Java EE and JAAS security standards / / Omar Siliceo |
Autore | Siliceo Omar |
Pubbl/distr/stampa | Birmingham, UK, : Packt Enterprise Pub., c2011 |
Descrizione fisica | 1 online resource (313 p.) |
Disciplina | 005.2762 |
Soggetto topico | Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-01613-3
9786613016133 1-84968-149-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view
WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources Testing the secured application server environment |
Record Nr. | UNINA-9910456932803321 |
Siliceo Omar
![]() |
||
Birmingham, UK, : Packt Enterprise Pub., c2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IBM WebSphere application server V7.0 security [[electronic resource] ] : secure your WebSphere applications with Java EE and JAAS security standards / / Omar Siliceo |
Autore | Siliceo Omar |
Pubbl/distr/stampa | Birmingham, UK, : Packt Enterprise Pub., c2011 |
Descrizione fisica | 1 online resource (313 p.) |
Disciplina | 005.2762 |
Soggetto topico | Computer networks - Security measures |
ISBN |
1-283-01613-3
9786613016133 1-84968-149-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view
WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources Testing the secured application server environment |
Record Nr. | UNINA-9910781109303321 |
Siliceo Omar
![]() |
||
Birmingham, UK, : Packt Enterprise Pub., c2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|