top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Building Multi-Tier Scenarios for WebSphere Enterprise Applications / / [Holger Wunderlich and others]
Building Multi-Tier Scenarios for WebSphere Enterprise Applications / / [Holger Wunderlich and others]
Pubbl/distr/stampa Poughkeepsie, NY : , : IBM, International Business Machines Corporation, , 2003
Descrizione fisica 1 online resource (194 pages)
Altri autori (Persone) WunderlichHolger
Collana IBM Redbooks
Soggetto topico Object-oriented programming (Computer science)
Web site development
Application software
Software
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910450116203321
Poughkeepsie, NY : , : IBM, International Business Machines Corporation, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building Multi-Tier Scenarios for WebSphere Enterprise Applications / / [Holger Wunderlich and others]
Building Multi-Tier Scenarios for WebSphere Enterprise Applications / / [Holger Wunderlich and others]
Pubbl/distr/stampa Poughkeepsie, NY : , : IBM, International Business Machines Corporation, , 2003
Descrizione fisica 1 online resource (194 pages)
Altri autori (Persone) WunderlichHolger
Collana IBM Redbooks
Soggetto topico Object-oriented programming (Computer science)
Web site development
Application software
Software
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783529903321
Poughkeepsie, NY : , : IBM, International Business Machines Corporation, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building multi-tier scenarios for WebSphere Enterprise applications / / [Holger Wunderlich ... et al.]
Building multi-tier scenarios for WebSphere Enterprise applications / / [Holger Wunderlich ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa Poughkeepsie, NY, : IBM, International Support Organization, c2003
Descrizione fisica 1 online resource (194 pages)
Disciplina 005.1/17
Altri autori (Persone) WunderlichHolger
Collana IBM redbooks
Soggetto topico Object-oriented programming (Computer science)
Web site development
Application software
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Integrated and multi-tier solution concepts -- Chapter 1. Integrated and multi-tier WebSphere application deployment -- 1.1 Multi-tiered environment considerations -- 1.1.1 Today's e-business infrastructures -- 1.1.2 Platforms to run e-business applications -- 1.1.3 Basic architectural considerations -- 1.1.4 Separating Web components from business logic -- 1.2 Concepts and building blocks for hybrid WebSphere solutions -- 1.2.1 Using the Patterns approach -- 1.2.2 Mapping the patterns to our identified motivations -- 1.3 An introduction to tiers and architectures -- 1.3.1 Introducing multi-tier architectures -- 1.3.2 Multiple logical and physical tiers -- 1.3.3 The network layer -- 1.4 Application architecture and packaging -- 1.4.1 Model-View-Controller (MVC) design pattern -- 1.4.2 Application packaging -- 1.5 Decision guidelines for handling Web applications -- 1.5.1 Deployment choices -- Chapter 2. Integrated and hybrid WebSphere application deployment scenarios -- 2.1 Static Web component relocation -- 2.1.1 Architectural elements for static Web content acceleration -- 2.2 Dynamic component relocation -- 2.2.1 Application elements -- 2.2.2 Overview of hybrid deployment assessment criteria -- 2.2.3 Options for logical application separation -- 2.2.4 Options for physical application separation -- 2.2.5 Options for J2EE inter-component communication -- 2.3 Evaluation criteria for remote component and EIS access -- 2.3.1 Performance -- 2.3.2 Availability -- 2.3.3 Security -- 2.3.4 Transaction integrity -- 2.3.5 Infrastructure criteria -- 2.3.6 Development and deployment criteria -- 2.3.7 Systems management -- 2.3.8 Strategic considerations -- Chapter 3. Component interaction characteristics.
3.1 Connection types -- 3.1.1 Cross-reference table -- 3.2 RMI/IIOP access to remote enterprise beans -- 3.2.1 Performance -- 3.2.2 Availability -- 3.2.3 Security -- 3.2.4 Transaction integrity -- 3.2.5 Infrastructure -- 3.2.6 Development and deployment -- 3.2.7 Systems management -- 3.2.8 Strategic considerations -- 3.3 JDBC access to DB2 -- 3.3.1 DB2 Connect -- 3.3.2 Performance -- 3.3.3 Availability -- 3.3.4 Security -- 3.3.5 Transaction integrity -- 3.3.6 Infrastructure -- 3.3.7 Development and deployment -- 3.3.8 Systems management -- 3.3.9 Strategic considerations -- 3.4 JCA access to CICS -- 3.4.1 CICS Transaction Gateway -- 3.4.2 Performance -- 3.4.3 Availability -- 3.4.4 Security -- 3.4.5 Transaction integrity -- 3.4.6 Infrastructure -- 3.4.7 Development and deployment -- 3.4.8 Systems management -- 3.4.9 Strategic considerations -- Chapter 4. Static Web component optimization -- 4.1 Overview -- 4.2 Dynamic fragment caching concepts -- 4.2.1 Configuring dynamic fragment cache support -- 4.3 Configuration 1: Local IBM HTTP Server for static file handling -- 4.3.1 HTTP session considerations -- 4.3.2 Security considerations -- 4.3.3 System management considerations -- 4.3.4 Performance considerations -- 4.4 Configuration 2: Local IBM HTTP Server with WebSphere HTTP Plug-in -- 4.4.1 HTTP session considerations -- 4.4.2 Security considerations -- 4.4.3 System management considerations -- 4.4.4 Performance considerations -- 4.4.5 Infrastructure considerations for configurations 1 and 2 -- 4.5 Configuration 3: Remote reverse proxy caching server -- 4.5.1 HTTP session considerations -- 4.5.2 Security considerations -- 4.5.3 System management considerations -- 4.5.4 Performance considerations -- 4.6 Configuration 4: Remote IBM HTTP Server with WebSphere HTTP Plug-in -- 4.6.1 HTTP session considerations -- 4.6.2 Security considerations.
4.6.3 System management considerations -- 4.6.4 Performance considerations -- 4.6.5 Infrastructure considerations for configurations 3 and 4 -- 4.7 Application considerations -- 4.7.1 Application programming and assembly -- 4.8 Trends and directions -- Part 2 Implementation guidelines -- Chapter 5. Implementing static Web content acceleration scenarios -- 5.1 Application development and deployment -- 5.1.1 Analyzing the application -- 5.1.2 Assembling the application -- 5.1.3 Deploying the application -- 5.1.4 Testing the application -- 5.2 Infrastructure implementation -- 5.2.1 Common elements of the configurations -- 5.2.2 Configuration 1: Local IBM HTTP Server for static file handling -- 5.2.3 Configuration 2: Local IBM HTTP Server with WebSphere HTTP Plug-in -- 5.2.4 Configuration 3: Remote reverse proxy caching server -- 5.2.5 Configuration 4: Remote IBM HTTP Server with WebSphere HTTP Plug-in -- Chapter 6. Implementing IIOP-based cross-platform scenarios -- 6.1 Application development and deployment -- 6.1.1 Analyzing the application -- 6.1.2 Assembling the application -- 6.1.3 Deploying the application into multiple tiers -- 6.2 Importing the Java Pet Store Demo application into WebSphere Studio Application Developer V4 -- 6.2.1 Preparation of files -- 6.2.2 Importing petstore.ear into WSAD -- 6.2.3 Importing source code into WSAD -- 6.2.4 Testing the application in WebSphere Studio Application Developer V4 -- 6.2.5 Debugging Java Pet Store Demo -- 6.2.6 Problems encountered while splitting Java Pet Store Demo -- 6.2.7 Processing a Unicode XML file in WebSphere Application Server Advanced Edition Version 5 -- 6.2.8 Testing the application -- Part 3 Appendixes -- Appendix A. Integrated and multi-platform scenario sandbox -- 6.2.9 Our testing tools -- Related publications -- IBM Redbooks -- Other publications -- Online resources.
How to get IBM Redbooks -- Index -- Back cover.
Record Nr. UNINA-9910824918903321
Poughkeepsie, NY, : IBM, International Support Organization, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Z/OS WebSphere and J2EE security handbook [[electronic resource] /] / [Holger Wunderlich ... et al.]
Z/OS WebSphere and J2EE security handbook [[electronic resource] /] / [Holger Wunderlich ... et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Poughkeepsie, N.Y., : IBM International Technical Support Organization, 2003
Descrizione fisica xxvi, 780 p. : ill
Disciplina 005.8
Altri autori (Persone) WunderlichHolger
Collana Redbooks
Soggetto topico Computer networks - Security measures
Internet - Security measures
Java (Computer program language)
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910449740303321
Poughkeepsie, N.Y., : IBM International Technical Support Organization, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Z/OS WebSphere and J2EE security handbook [[electronic resource] /] / [Holger Wunderlich ... et al.]
Z/OS WebSphere and J2EE security handbook [[electronic resource] /] / [Holger Wunderlich ... et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Poughkeepsie, N.Y., : IBM International Technical Support Organization, 2003
Descrizione fisica xxvi, 780 p. : ill
Disciplina 005.8
Altri autori (Persone) WunderlichHolger
Collana Redbooks
Soggetto topico Computer networks - Security measures
Internet - Security measures
Java (Computer program language)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783370403321
Poughkeepsie, N.Y., : IBM International Technical Support Organization, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Z/OS WebSphere and J2EE security handbook / / [Holger Wunderlich ... et al.]
Z/OS WebSphere and J2EE security handbook / / [Holger Wunderlich ... et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Poughkeepsie, N.Y., : IBM International Technical Support Organization, 2003
Descrizione fisica xxvi, 780 p. : ill
Disciplina 005.8
Altri autori (Persone) WunderlichHolger
Collana Redbooks
Soggetto topico Computer networks - Security measures
Internet - Security measures
Java (Computer program language)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Who should read this book -- Notice -- Comments welcome -- Summary of changes -- August 2003, Second Edition -- Part 1 Getting started -- Chapter 1. Security design -- 1.1 Overview of security concerns -- 1.2 Finding the right level of security for your enterprise -- 1.2.1 Logon to z/OS -- 1.2.2 One userid fits all -- 1.2.3 Userid and password in a database -- 1.2.4 Reverse proxy -- 1.2.5 Security model selection -- 1.2.6 Additional security considerations -- Putting the pieces together -- 1.2.7 Basic security setup -- 1.2.8 Basic reverse proxy setup -- 1.2.9 A business-to-business variation -- 1.3 Finding the right balance for your application -- 1.3.1 A little background -- 1.3.2 Container-managed security -- 1.3.3 Application-managed security -- 1.4 Summary -- Chapter 2. The security investigation application -- 2.1 The SWIPE Application -- 2.1.1 SWIPE Application structure -- 2.1.2 SWIPE Application architecture and description -- 2.2 SWIPE's authentication features -- 2.3 Authorization features -- 2.3.1 EJBRoles in the sample -- 2.3.2 Declarative security -- 2.3.3 Programmatic security -- 2.3.4 The RunAs concept -- 2.3.5 The "Sync to OS Thread" concept -- 2.4 The downloadable SWIPE package -- 2.4.1 The Windows subdirectory -- 2.4.2 The z/OS subdirectory -- 2.4.3 The Trust-AI subdirectory -- 2.5 Deploying SWIPE -- 2.6 Running SWIPE -- 2.6.1 SWIPE - input Part A -- 2.6.2 SWIPE - input Part B -- Chapter 3. The sandbox infrastructure -- 3.1 Physical integration into the network infrastructure -- 3.2 Logical and z/OS TCP/IP view -- 3.3 System setup and Service Levels -- 3.3.1 Server infrastructure, Application Server, backends, product levels, PTF levels -- Part 2 J2EE security concepts and implementation.
Chapter 4. Introduction to J2EE and WebSphere Application Server for z/OS and OS/390 runtime conc... -- 4.1 J2EE concepts -- 4.1.1 J2EE components -- 4.1.2 Application programs -- 4.1.3 Runtime environments -- 4.1.4 Development and deployment process -- 4.2 Overview of J2EE implementation in WebSphere Application Server for z/OS and OS/390 -- 4.2.1 WebSphere Application Server for z/OS and OS/390 runtime -- 4.2.2 Sources of requests -- 4.2.3 Developing and deploying J2EE applications for WebSphere Application Server for z/OS and OS... -- Chapter 5. Introduction to J2EE security concepts -- 5.1 Overview of J2EE security -- 5.2 Terminology used for J2EE security -- 5.3 Authentication and authorization in J2EE containers -- 5.3.1 Role-based authorization -- 5.3.2 Web container authentication and authorization -- 5.3.3 EJB container authentication and authorization -- 5.4 Resource authentication -- Chapter 6. WebSphere and J2EE security -- 6.1 WebSphere architecture review -- 6.2 Relationship of WebSphere Application Server for z/OS and OS/390 to System Authorization Faci... -- 6.2.1 EJBROLES -- 6.2.2 GEJBROLE: grouping EJBROLEs -- 6.3 Web container authentication and authorization -- 6.4 EJB container authentication and authorization -- 6.4.1 The RunAs concept -- 6.4.2 The ThreadID concept -- 6.4.3 Enabling ThreadID -- 6.5 Authenticating to J2EE resources -- 6.6 Authorization and serialization in the Administration Application (SMEUI) -- 6.7 System Management Scripting API (SMAPI) -- Part 3 z/OS security foundation -- Chapter 7. Beginner's guide to z/OS security -- 7.1 System Authorization Facility - concept -- 7.2 Resource Access Control Facility (RACF) -- 7.2.1 Identifying and verifying users -- 7.2.2 User and Group base resource protection -- 7.2.3 RACF PassTicket -- 7.2.4 Auditing and reporting -- 7.3 Authorization and program protection.
7.4 z/OS UNIX security -- 7.5 Accessor Environment Element (ACEE) and RACF objects -- 7.6 Storage keys -- 7.7 Secure Sockets Layer and Transport Layer security -- Chapter 8. z/OS security - advanced topics -- 8.1 Cryptographic support -- 8.1.1 Securing and maintaining cryptography -- 8.2 TCP/IP -- 8.2.1 TCP/IP stacks -- 8.2.2 Protecting TCP/IP -- 8.3 Firewalls -- 8.4 Intrusion Detection Services (IDS) -- Chapter 9. Integration of WebSphere into z/OS security mechanisms -- 9.1 WebSphere infrastructure security and integrity -- 9.2 Securing the WebSphere runtime environment -- 9.3 Administration Application -- Chapter 10. Securing WebSphere using RACF -- 10.1 Introduction -- 10.2 Classes and profiles -- 10.3 Enabling WebSphere Application Server V4.0.1 for z/OS and OS/390 runtime in RACF -- 10.3.1 Activating EJBROLE for J2EE security constraints -- 10.3.2 Activating the CBIND class for client access to servers -- 10.3.3 Activating the SERVER class for server access to the daemon -- 10.3.4 Activating the SERVAUTH class to control z/OS Communication Server resources -- 10.3.5 Activating the PTKTDATA class to enable PassTickets support -- 10.3.6 BPX profiles in the Facility class -- Chapter 11. Securing WebSphere using eTrust CA-ACF2 -- 11.1 Introduction to eTrust CA ACF2 -- 11.2 Classes and profiles -- 11.3 Enablement of WebSphere in eTrust CA ACF2 -- 11.3.1 WebSphere Application Server for z/OS and OS/390 -- 11.3.2 Authorization checking -- 11.3.3 Level of Trust and Access Authority for regions -- 11.3.4 User identification, authentication and network security -- 11.3.5 Resource managers -- 11.3.6 Protection and Protect directives -- 11.3.7 Prerequisites -- 11.3.8 Installation steps -- 11.3.9 ACFCSEC -- 11.3.10 Problem determination and debugging -- 11.3.11 Bibliography.
Chapter 12. Securing WebSphere using eTrust CA-Top Secret Security for z/OS and OS/390 -- 12.1 Introduction to eTrust CA-Top Secret -- 12.2 Classes and special records -- 12.3 Enablement of WebSphere in eTrust CA-Top Secret -- 12.3.1 Server authorization checking -- 12.3.2 User identification, authentication and network security -- 12.3.3 WASADM -- 12.3.4 Problem determination and debugging -- 12.3.5 Bibliography -- Part 4 Authentication and authorization -- Chapter 13. Introduction to authentication and authorization -- 13.1 Introduction to authentication -- 13.1.1 Authentication methods -- 13.2 Introduction to authorization -- 13.2.1 Resource authorization at the operating system level -- 13.2.2 Resource authorization at the application level -- Chapter 14. Authentication - details -- 14.1 Introduction to authentication -- 14.1.1 Authentication methods -- 14.2 Authentication in the Web container -- 14.2.1 Unauthenticated -- 14.2.2 HTTP Digest authentication -- 14.2.3 HTTP Basic authentication -- 14.2.4 HTTPS basic authentication -- 14.2.5 Certificate-based authentication -- 14.2.6 Form-based authentication -- 14.2.7 Form-based authentication pragmatics -- 14.2.8 Form-based authentication revision -- 14.3 Authentication in the EJB container -- 14.3.1 Basic authentication -- 14.3.2 Certificate-based authentication -- 14.3.3 Kerberos authentication -- 14.3.4 Asserted identity -- 14.3.5 Unauthenticated -- 14.4 EJB container authentication in a single-system environment -- 14.5 EJB container authentication in a sysplex -- 14.6 Authentication between z/OS systems outside a sysplex -- 14.7 Authentication with EJB applications on non-z/OS platforms -- Chapter 15. Authentication flow -- 15.1 Introduction to authentication flow -- 15.2 The initial decision process -- 15.3 Authentication processing -- 15.4 Basic authentication.
15.5 Form-based authentication -- 15.6 Client certificate-based authentication -- 15.7 Setting the userid -- 15.8 Unauthenticated processing -- 15.9 HTTP Server processing flow -- Chapter 16. Authorization - details -- 16.1 Introduction to authorization -- 16.1.1 Resource authorization at the operating system level -- 16.1.2 Resource authorization at the application level -- 16.2 Resource authorization in J2EE applications -- 16.2.1 Security identities -- 16.2.2 Security roles -- 16.2.3 Web container authorization -- 16.2.4 EJB container authorization -- 16.3 Operating system level resource authorization -- 16.3.1 Synchronizing operating system and container identities -- Part 5 Cross-platform security infrastructures -- Chapter 17. Cross-platform security -- 17.1 Trust Association Interceptor (TAI) -- 17.1.1 Overview -- 17.1.2 What the Trust Association Interceptor is -- 17.1.3 TAI decision flow -- 17.1.4 Coding a Trust Association Interceptor -- 17.1.5 Enabling TAI -- 17.1.6 Configuring the Trust Association Interceptor -- 17.1.7 Multiple Trust Association Interceptors -- 17.2 Tivoli Access Manager integration into WebSphere on z/OS -- 17.2.1 Overview -- 17.2.2 The products -- 17.2.3 Tivoli Access Manager integration into z/OS security -- 17.2.4 More integration scenarios -- Part 6 Security for the Enterprise Integration Tier -- Chapter 18. Security for Enterprise Integration Systems -- 18.1 Overview: backend access in J2EE -- 18.1.1 The difference between JCA and JDBC -- 18.2 Using JCA connectors -- 18.2.1 Accessing an EIS via a JCA connector -- 18.2.2 Comparing CCF and JCA -- 18.3 Using JDBC -- 18.3.1 Accessing a database via JDBC -- 18.4 Important attributes in the deployment descriptor -- 18.4.1 Transactions -- 18.4.2 RunAs -- 18.4.3 ThreadID -- 18.4.4 Resource Reference attribute: Authentication.
18.4.5 Resource reference attribute: Connection Management.
Record Nr. UNINA-9910822232003321
Poughkeepsie, N.Y., : IBM International Technical Support Organization, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui