WF3815V13 Security1
WF3815V13 Security1
WF3815V13 Security1
Introduction to Security
Objectives
•Discuss what resources should be secured in an enterprise
environment
•Discuss authentication and how it is supported in WebSphere
Application Server
•Discuss authorization
•Discuss delegation options
•Discuss the role of certificates
•Discuss the implications of using SSL
•Discuss the concepts of principals and roles
Basic "No Security" End-to-End Model
(Internet) Web
2 Server
1
Client 5
4
User
Registry
Authentication
•Authentication: Tell a server who you are, or simply log in
–Challenge Mechanism
(how to obtain
authentication data) Challenge user
–Authentication
Mechanism Challenge
Mechanism
(LTPA, Native OS or
Authentication Data
Pluggable Registry) (uid/pw, cert, token)
User
Registry
Authentication in WebSphere Application Server
Basic Authentication
3. Request Web Page
5. userid = peter
password = pumpkin
2. Tell user
userid = peter 6. Check Password
password = pumpkin
1. Register user
Authentication
Admin userid = peter
password = pumpkin
DB
Native OS LDAP
"root"
objectClass=country
c=US c=UK
objectClass=organization
objectClass=person
Enterprise Enterprise
2. Challenge User for JavaBeans JavaBeans
Authentication
Server Server
3. User
WebSphere
Authenticates
Application
Server
7. Create authToken cookie;
serve the request
4. Authenticate (authenticationData)
Systems
Management
LTPA Server
HTTP or
HTTPS Create Token
Validate Token
Security Plug-in
client
Authorization
•Authorization involves granting trusted Principals permission
to perform actions on resources (that is, Web Pages, Servlets,
JSPs and EJBs).
•Control access to resources.
–Security Lookup (by server)
•Determine security privileges for principal.
•Information stored in registry.
Rules
userX, opY
decide opY???
client userX??
server
id = client id = X
Web Web
Browser Server
HTTP Internet Port 80
Network Layer
Secure Sockets Layer
TCP/IP Layer
Certificate
Authority