+

Search Tips   |   Advanced Search

(iSeries)

Object and file security

This topic discusses the various objects and files that contain sensitive information and need to be protected.


Secure integrated file system files

In addition to enterprise beans and servlets, WebSphere Application Server accesses integrated file system stream files. The following files might contain sensitive information. IBM recommends that you give these files close consideration to ensure that unauthorized access is not granted.


Secure database resources for WAS

WAS uses tables to persist data for user applications such as enterprise beans persistence and servlet session data. We have several options for controlling which user profiles are allowed access to this user data. See Database access security.


Secure WAS files

When we enable WAS security, the server user profile and password are placed into server configuration files, which should be maintained in a secure way using operating system security. Additionally, we can password protect some WAS resources. These passwords are also placed in server configuration files. The server automatically encodes passwords to deter casual observation, but password encoding alone is not sufficient protection.

The following files are located in the /config subdirectory of our profile and they can contain user identifiers and passwords:

For example, for the default profile, the server is server1.

The server user profile and password are used for authenticating the server when it initializes. This authentication is required for the following reasons:


Secure user profiles for WAS

When WAS is first installed, by default, it uses the following user profiles:

QEJB

This profile provides access to some administrative data, including passwords.

QEJBSVR

This profile provides the context in which our WAS runs. For security or administrative purposes, we might want to create other user profiles under which to run various parts of WAS. See Running application servers under specific user profiles.


Related:

  • Password encoding and encryption
  • Troubleshoot security configurations