Set multiple security domains using scripting
We can customize the security configuration at the cell, sever, or cluster level by configuring multiple security domains.
Users assigned to the administrator role can configure security domains. Verify that we have the appropriate admin role before configuring security domains. Also, enable global security in the environment before configuring multiple security domains.
We can create multiple security domains to customize the security configuration. Use multiple security domains to achieve the following goals:
- Set different security attributes for admin and user applications within a cell
- Consolidate server configurations by managing different security configurations within a cell
- Restrict access between applications with different user registries, or configure trust relationships between applications to support communication across registries
- Create a security domain.
Create multiple security domains in the configuration. By creating multiple security domains, we can configure different security attributes for admin and user applications within a cell environment.
- Assign the security domain to one or a set of resources or scopes. Assign management resources to security domains. Set management resources to the security domains to customize the security configuration for a cell, server, or cluster.
- Customize the security configuration by specifying attributes for the security domain.
See the following examples of security attributes:
- User registries to validate user credentials
- Authorization for validating access to resources
- Trust association interceptor (TAI) to authenticate a Web user using a reverse proxy server
- Application and system JAAS login configurations
- LTPA timeout settings
- Application security enablement to provide application isolation and requirements for authenticating application users
- Java™ 2 Security to increase overall system integrity by checking for permissions before allowing access to certain protected system resources
- Remote Method Invocation over Internet Inter-ORB Protocol (RMI/IIOP) to invoke Web services through remote procedure calls
- Custom properties
Set security domains using scripting
Set local operating system user registries using scripting
Set custom user registries using scripting
Set JAAS login modules using scripting
Set Common Secure Interoperability authentication using scripting
Set trust association using scripting
Mapping resources to security domains using scripting
Remove resources from security domains using scripting
Remove security domains using scripting
Remove user registries using scripting