Secure communication with custom applications

Custom applications that access the ISIM Server must adhere to programming guidelines the ensure:

IBM Security Identity Manager shields its core functions with a layer of managed enterprise Java beans. These EJBs are in an unprivileged layer of ISIM. When ISIM communicates with a client application, every managed EJB method takes a signed token from the caller. The token verifies the caller identity, except when the method does the authentication. The caller obtains this signed token after authentication with ISIM Server.

The following types of custom applications can be created to communicate with ISIM Server.

When developing custom applications to communicate with ISIM Server, use the following rules to ensure secure communication:

WebSphere Application Server uses roles to manage access to application components and other objects, including user and group names. Use the following guidelines for assigning roles in custom applications that interface with ISIM Server.

Parent topic: Security