Amazon cover image
Image from Amazon.com

IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards / Omar Siliceo.

By: Material type: TextTextPublication details: Birmingham [UK] : Packt Pub./Enterprise, 2011.Description: 1 online resource (viii, 290 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781849681490
  • 184968149X
  • 1849681481
  • 9781849681483
  • 1283016133
  • 9781283016131
  • 9786613016133
  • 6613016136
Subject(s): Genre/Form: Additional physical formats: Print version:: IBM WebSphere application server v7.0 secruity.DDC classification:
  • 005.8 22
LOC classification:
  • TK5105.8885.W43 S55 2011eb
Online resources:
Contents:
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view
WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice
Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console
Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories
AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources
Summary: Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Print version record.

Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view

WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice

Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console

Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories

AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources

Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook.

English.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library