Administration guide > Secure the deployment environment > Tutorial: Security in a mixed environment


Secure the deployment environment > Tutorial: Integrate WebSphere eXtreme Scale security in a mixed environment with an external authenticator >

< Previous | Next >


Introduction: Security in a mixed environment

In this tutorial, you integrate WebSphere eXtreme Scale security in a mixed environment. The container servers run within WAS, and the catalog service runs in stand-alone mode. Because the catalog server is in stand-alone mode, configure an external authenticator.

If both the container servers and catalog server are running within WAS, you can use the WAS Authentication plug-ins or an external authenticator. For more information about using the WAS Authentication plug-ins, see Tutorial: Integrate WebSphere eXtreme Scale security with WAS.


Learning objectives

The learning objectives for this tutorial follow:


Time required

This tutorial takes approximately 4 hours from start to finish.


Skill level

Intermediate.


Audience

Developers and administrators that are interested in the security integration between WebSphere eXtreme Scale and WAS and configuring external authenticators.


System requirements

This tutorial uses four WAS application servers and one deployment manager to demonstrate the sample.


Prerequisites

A basic understanding of the following items is helpful before you start this tutorial:

For a background information about WebSphere eXtreme Scale and WAS security integration, see Security integration with WAS.


Modules in this tutorial

< Previous | Next >