+

Search Tips   |   Advanced Search

(iseries)

Object and file security

This topic discusses the various objects and files containing sensitive information and need to be protected.


Secure integrated file system files

In addition to enterprise beans and servlets, WebSphere Application Server accesses integrated file system stream files. The following files might contain sensitive information. IBM recommends that you give these files close consideration to ensure that unauthorized access is not granted.


Secure database resources for WebSphere Application Server

WAS uses tables to persist data for user applications such as enterprise beans persistence and servlet session data. You have several options for controlling which user profiles are allowed access to this user data. For more information, see Database access security.


Secure WebSphere Application Server files

When you enable WAS security, the server user profile and password are placed into server configuration files, which should be maintained in a secure way using operating system security. Additionally, we can password protect some WebSphere Application Server resources. These passwords are also placed in server configuration files. The server automatically encodes passwords to deter casual observation, but password encoding alone is not sufficient protection.

The following files are located in the /config subdirectory of the profile and they can contain user identifiers and passwords:

For example, for the default profile, the server_name is server1.

The server user profile and password are used for authenticating the server when it initializes. This authentication is required for the following reasons:


Secure user profiles for WebSphere Application Server

When WebSphere Application Server is first installed, by default, it uses the following user profiles:

QEJB

This profile provides access to some administrative data, including passwords.

QEJBSVR

This profile provides the context in which the WAS runs. For security or administrative purposes, you might want to create other user profiles under which to run various parts of WAS. For more information, see Running application servers under specific user profiles.


Related concepts

  • Password encoding and encryption


    Related tasks

  • Troubleshooting security configurations