Administer security

 

+

Search Tips   |   Advanced Search

 

 

Overview

Administering secure applications requires access to the WAS administrative console. Log in with a valid user ID and password that have administrative access. To administer security, complete these steps:

 

Procedure

  1. Configure global security

  2. Assign users to administrator roles.

  3. Assign users to naming roles.

  4. Configure authentication mechanisms.

  5. Configure Lightweight Third Party Authentication.

  6. Configure trust association interceptors.

  7. Configure single signon.

  8. Configure user registries

    1. Configure local operating system user registries.

    2. Configure LDAP User registries

    3. Configure custom user registries

  9. Configure JAAS login.

  10. Configure an authorization provider.

  11. Configure the CSIv2 and Security Authentication Service authentication protocols.

  12. Configure SSL.

  13. Configure Java 2 Security Manager.

  14. Optional: Configure security attribute propagation.

 

See also


Global security
Configure global security
Administrative console and naming service authorization
Assign users to administrator roles
Assign users to naming roles
Authentication mechanisms
Configure authentication mechanisms
User registries
Configure user registries
JAAS
Configure application logins for JAAS
Identity mapping
Configure inbound identity mapping
Configure outbound mapping to a different target realm
Security attribute propagation
Enable security attribute propagation
Default PropagationToken
Implement a custom PropagationToken
Default AuthorizationToken
Implement a custom AuthorizationToken
Default SingleSignonToken
Implement a custom SingleSignonToken
Default AuthenticationToken
Implement a custom AuthenticationToken
Propagate a custom Java serializable object
Authorization in WAS
JACC providers
JACC support in WAS
Enable an external JACC provider
Propagate security policy of installed applications to a JACC provider using wsadmin scripting
Configure a JACC provider
Interfaces used to support JACC
Tivoli Access Manager integration as the JACC provider
Tivoli Access Manager security for WAS
Create the security administrative user
Tivoli Access Manager JACC provider configuration
Configure the JACC provider for Tivoli Access Manager using the wsadmin utility
Configure the JACC provider for Tivoli Access Manager using the administrative console
Enable the JACC provider for Tivoli Access Manager
Configure additional authorization servers
Role-based security with embedded Tivoli Access Manager
Administer security users and roles with Tivoli Access Manager
Configure Tivoli Access Manager groups
Tivoli Access Manager JACC provider configuration properties
Log Tivoli Access Manager security
Enable embedded Tivoli Access Manager
Disable embedded Tivoli Access Manager client
Disable embedded Tivoli Access Manager client using the Administration Console
Disable embedded Tivoli Access Manager client using wsadmin
Force the unconfiguration of the Tivoli Access Manager JACC provider
Update console users and groups
The Tivoli Access Manager migrateEAR utility
Troubleshoot authorization providers
Authentication protocol for EJB security
Configure CSIv2 and Security Authentication Service authentication protocols
SSL
Configure SSL
Cryptographic token support
Open a cryptographic token using the key management utility (iKeyman)
Configure to use cryptographic tokens
Use JSSE and JCE with Servlets and enterprise bean files
Java 2 security
Configure Java 2 security

 

Related Tasks


Configure single signon