Secure - WebSphere Commerce V7
- Secure
- WebSphere Commerce security model
- WebSphere Commerce authentication model
- Credentials
- Single sign-on
- Authentication policies
- Default account policies
- Authorization
- Access control policy
- Access control policy groups
- Access control policies and policy group structure
- Enforcing access control
- Evaluate access control policies
- Example: Examining an access control policy
- Example: Configuring fixed amount shipping charges
- Default access control policies
- Role-based policies
- Resource-level policies
- Default access control policy groups
- Customize default access control policies
- Relationships between role-based and resource-level policies
- Role-based and resource-level policies
- Define access control policy elements using XML
- Access control files
- Protect views
- Add a new view using existing policies
- Add a new view using a new policy
- Protect controller commands
- Add a new controller command using existing policies
- Add a new controller command using a new policy
- Modify the command-level access control for a controller command
- Modify the resource-level access control of an existing policy
- Protect resources
- Protect data beans
- Group resources by attributes
- Define relationships
- Define relationship groups
- Define access groups
- Define policies
- Load access control policy data
- Load access groups
- Load access control policy definitions and other policy-related elements
- Load policy display names and descriptions
- Extract policy and access group definitions
- Test access control policy changes
- Examples: Customizing access control policies using the Organization Administration Console
- Create a new role-based access control policy
- View access control policies
- View parent access control policies
- Create an access control policy
- Update access control policies
- Delete policies
- Select a user group
- Create access groups
- Changing an access group
- Delete an access group
- List access groups
- List actions for an access group
- List access control resources for access groups
- List access control policies for an access group
- Create an action group
- View action groups
- Update action groups
- Delete action groups
- Create a resource group
- View resource groups
- Update a resource group
- Delete resource groups
- Subscribe to policy groups
- List site-level roles
- Create site-level roles
- Example: Removing the ability of auction administrators to close auction bidding
- Example: Removing the ability of auction managers to retract bids
- Example: Limiting auction bidding to buyers
- Example: Removing the ability of contract managers to add or delete attachments to contracts
- Example: Permitting both contract operators and contract administrators to deploy contracts
- Example: Permitting only Buyers to create orders
- Example: Allowing only Buyer Administrators to modify orders
- Example: Allowing RMA approvers to approve all RMAs
- Example: Removing the ability of users to self-register
- Example: Allowing only registered and approved users to change their address information
- Example: Allowing member registrars to register users
- Example: Allowing only buyers to redeem coupons
- Example: Permitting both coupon administrators and Operations Managers to create coupon promotions
- Example: Allowing procurement shopping cart managers to manage the procurement shopping cart for orders created by their organization
- Example: Allow procurement buyer administrators to submit the procurement shopping cart for orders created by their organization
- Example: Permitting fulfillment center managers to update fulfillment centers but not to delete them
- Example: Permitting only logistics managers, operations managers, and account representatives to create, update, or delete fulfillment centers
- Example: Allowing auditors to view business intelligence reports
- Enhance site security
- Security consideration for the Internet Information Services (IIS) Web server
- Enable login timeout
- Views for login timeout
- Enable password invalidation
- Views for password invalidation
- Enable password-protected commands
- Views for password protected commands
- Initialize KLF in WebSphere Commerce
- Key Locator Framework (KLF)
- Key Provider Implementations for merchant key
- Initialize KLF in WebSphere Commerce Payments
- Key Provider Implementations for Payments instance password
- Update encrypted data using Configuration Manager
- Optimize the MigrateEncryptedInfo utility
- Update encrypted data using MigrateEncryptedInfo
- Enable cross-site scripting protection
- Disable cross-site scripting protection for the Management Center
- Enable cross-site request forgery protection
- Enable URL redirect filtering
- Enable access logging
- Enable SSL for outbound Web services
- Changing the session encryption key
- Set up an account policy
- Set up a password policy
- Set up an account lockout policy
- Session management
- Use cookies for session management
- Persistent sessions (Remember Me)
- Enable persistent sessions globally
- Enable persistent sessions in a single store
- Dynamic caching considerations for persistent session
- Personalization ID
- Enable personalization ID
- Disable personalization ID
- Use URL rewriting for session management
- Use JSP pages for URL rewriting
- Set the expiration time of the referral cookie
- Quick reference to user IDs, passwords, and Web addresses
- Changing the Configuration Manager password
- Set the IBM HTTP Server administrator password
- Changing the SSL key file password
- Generate WebSphere Commerce encrypted passwords
- Reset accounts
- LDAP server password storage consideration
- Single sign-on
- Enable single sign-on
- X.509 certificates
- Enable X.509 certificates
- Update the status of X.509 certificate users
- Enable WebSphere Application Server security
- Enable WebSphere global security
- ...with federated repositories
- ... WebSphere file-based user registry only
- ... with an operating system user registry
- Enable Java 2 security
- Disable WebSphere Application Server security
- Configure security for the Dynamic Cache Monitor
- Overview: WebSphere Commerce and the PCI Data Security Standard
- Address the PCI Data Security Standard within WebSphere Commerce
- Requirement 1: Install and maintain a firewall configuration to protect cardholder data
- Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
- Requirement 3: Protect stored cardholder data
- Requirement 4: Encrypt transmission of cardholder data across open, public networks
- Requirement 5: Use and regularly update anti-virus software
- Requirement 6: Develop and maintain secure systems and applications
- Requirement 7: Restrict access to cardholder data by business need to know
- Requirement 8: Assign a unique ID to each person with computer access
- Requirement 9: Restrict physical access to cardholder data
- Requirement 10: Track and monitor all access to network resources and cardholder data
- Requirement 11: Regularly test security systems and processes
- Requirement 12: Maintain a policy that addresses information security for employees and contractors
- PCI Assessment Services for WebSphere Commerce