Enable WebSphere global security
Enabling WebSphere global security prevents all Enterprise JavaBeans components from being exposed to remote invocation by anyone. If you operate your WebSphere Commerce site from behind a firewall, you can disable WebSphere global security. However, you should disable it only if you are sure that no malicious applications are running behind the firewall.
The application server where WebSphere Commerce and WebSphere Commerce Payments are deployed is configured to use the DummyServerKeyFile.jks and DummyServerTrustFile.jks files with the default self-signed certificate out-of-the-box. Using the dummy key and trust file certificates is not safe; consequently, you should generate your own certificate to replace the dummy certificates immediately. Refer to the WAS Security Guide for more information about the dummy key and trust file certificates and how to replace them. For information on encoding passwords in files refer to Encoding password in files.
Before you begin to enable security, know how the WebSphere Application Server, where you are enabling security, validates user IDs. WebSphere Application Server can use an LDAP user registry or the operating system user registry as the WAS user registry. See one of the following pages for instructions on enabling security using one of the user registries:
- Enabling security with an LDAP user registry
- Enabling only global security with an LDAP user registry
- Enabling security with an operating system user registry
- Enabling only global security with an operating system user registry
WebSphere Commerce security deployment options
WebSphere Commerce supports various security deployment configurations. The following table illustrates the security deployment options available to you:
Single machine security scenarios
WebSphere global security is enabled.
- Use the operating system as the WAS registry.
- Use the database as the WebSphere Commerce registry.
- Use LDAP as the WAS registry.
- Use LDAP as the WebSphere Commerce registry.
- Use LDAP as the WAS registry.
- Use the database as the WebSphere Commerce registry.
WebSphere global security is disabled, and your WebSphere Commerce site is located behind a firewall.
- A WAS registry is not required.
- Use the database as the WebSphere Commerce registry.
- A WAS registry is not required.
- Use LDAP the WebSphere Commerce registry.
WebSphere global security is enabled. LDAP is always deployed. |
|
| |
WebSphere global security is disabled, and your WebSphere Commerce site is located behind a firewall. |
|
|
WebSphere Commerce Payments security deployment options
As
WebSphere Commerce Payments does not have Enterprise JavaBeans components
and it has Payments instance password to protect the application, in most
cases there is no need to enable security for WebSphere Commerce Payments.
However, if both a WebSphere Commerce node and a WebSphere Commerce Payments
node are federated into a ND (ND) cell, and global security
is to be enabled to secure WebSphere Commerce, there isn't any option not
to enable global security for WebSphere Commerce Payments as the global security
is global setting. WebSphere Commerce Payments supports various security deployment configurations. The
following table illustrates the security deployment options available to you.
Note that as it uses WebSphere Commerce registry, WebSphere Commerce Payments
does not have its own registry.
WebSphere global security is enabled. |
|
| |
WebSphere global security is disabled, and your WebSphere Commerce site is located behind a firewall. |
|
WebSphere global security is enabled. LDAP is always deployed. |
|
WebSphere global security is disabled, and your WebSphere Commerce site is located behind a firewall. |
|
Notes:
When enabling WebSphere global security, it is strongly recommended that your machine meets the following requirements:
Authentication failed for user uid=wpsbind,cn=users,dc=ibm,dc=com because of the following exception javax.naming.CommunicationException: svt4.cn.ibm.com:389. Root exception is java.net.BindException: Address in use: connect
After WebSphere global security is enabled for a payment instance, provide a username and password when starting and stopping the payment instance. For example: stopServer server1 -username administrator -password passw0rd.