WAS v8.5 > Secure applications > Secure web applications > Web application security components and settings > Assigning users and groups to roles

Add users and groups to roles using an assembly tool

After creating new roles and assigning them to enterprise bean and web resources, use this task to add users and groups to roles with an assembly tool.

Before you perform this task, you already completed the steps in Secure web applications using an assembly tool and Secure enterprise bean applications where you created new roles and assigned those roles to enterprise bean and web resources. Complete these steps during application installation. The environment user registry under which the application is running is not known until deployment.

If you already know the environment in which the application is running and the user registry used, we can use an assembly tool to assign users and groups to roles. Using the dmgr console to assign users and groups to roles is recommended.

This procedure might not match the steps required when using your assembly tool, or match the version of the assembly tool that you are using. You should follow the instructions for the tool and version that you are using.

To add users and groups to roles using an assembly tool, follow these steps:

  1. In the Project Explorer view of an assembly tool, right-click an enterprise application project, or EAR file and click Open With > Deployment Descriptor Editor. An application deployment descriptor editor opens on the EAR file. To access information about the editor, press F1 and click Application deployment descriptor editor.

  2. Click the Security tab and, under the main panel, click Add.
  3. In the Add Security Role wizard, name and describe the security role. Click Finish.

  4. Under WebSphere Bindings, select the user or group extension properties for the security role. Available values include: Everyone, All authenticated users, and Users/Groups.

  5. If you selected Users/Groups, click Add beside the Users or Groups panes. In the wizard that opens, specify a user or group name and click Finish. Repeat this step until you added all the users and groups to which the security role applies.
  6. Close the application deployment descriptor editor and, when prompted, click Yes to save the changes.


Results

The ibm-application-bnd.xmi or ibm-application-bnd.xml file in the application contains the users and groups-to-roles mapping table, which is the authorization table. For Java EE v5 applications, the ibm-application-bnd.xml file contains the authorization table.

For IBM extension and binding files, the .xmi or .xml file name extension is different depending on whether you are using a pre-Java EE 5 application or module or a Java EE 5 or later application or module. An IBM extension or binding file is named ibm-*-ext.xmi or ibm-*-bnd.xmi where * is the type of extension or binding file such as app, application, ejb-jar, or web. The following conditions apply:

However, a Java EE 5 or later module can exist within an application that includes pre-Java EE 5 files and uses the .xmi file name extension.

The ibm-webservices-ext.xmi, ibm-webservices-bnd.xmi, ibm-webservicesclient-bnd.xmi, ibm-webservicesclient-ext.xmi, and ibm-portlet-ext.xmi files continue to use the .xmi file extensions. sptcfg

After securing an application, install the application using the dmgr console.


Related concepts:

Web component security
Role-based authorization


Related


Assemble applications


Reference:

Security: Resources for learning


+

Search Tips   |   Advanced Search