Develop secured applications
IBM WAS provides security components that provide or collaborate with other services to provide authentication, authorization, delegation, and data protection. WAS also supports the security features described in the Java 2 Enterprise Edition (J2EE) specification. An application goes through three stages before it is ready to run:
- Development
- Assembly
- Deployment
Most of the security for an application is configured during the assembly stage. The security configured during the assembly stage is called declarative security because the security is declared or defined in the deployment descriptors. The declarative security is enforced by the security run time. For some applications, declarative security is not sufficient to express the security model of the application. For these applications, you can use programmatic security.
- Develop secure Webapplications.
- Develop servlet filters for form login processing.
- Develop form login pages.
- Develop enterprise bean component applications.
- Develop with Java Authentication and Authorization Service to log in programmatically.
- Develop your own Java 2 security mapping module.
- Develop custom user registries.
- Develop a custom interceptor for trust associations.
See Also
Web component security
Enterprise bean component security
Trust Associations
Java Authentication and Authorization Service
Java 2 Connector security
Custom user registries