Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment


How do I secure applications and their environments?

Follow these shortcuts to get started quickly with popular tasks.

When you visit a task in the information center, look for the IBM Suggests feature at the bottom of the page. Use it to find available tutorials, demonstrations, presentations, developerWorks articles, Redbooks, support documents, and more.

deployment descriptors." /> Secure HTTP sessions

deployment descriptors. The declarative security is enforced by the security run time." /> Develop applications that use programmatic security

deployment descriptors. The declarative security is enforced by the security run time." /> Configure declarative security for EJB applications that use J2EE authorization

deployment descriptors. The declarative security is enforced by the security run time." /> Develop programmatic security for EJB applications that use J2EE authorization

message-level security into an application serving environment. Web Services Security for WAS is based on a set of standards that are included in the Web Services Security (WS-Security) specification. These standards address how to provide protection for messages that are exchanged in a web services environment. The set of specification defines the core facilities for protecting the integrity and confidentiality of a message and provides mechanisms for associating security-related claims with the message." /> Apply Web Services Security (WS-Security) to applications

message-level security into an application serving environment. Web Services Security for WAS is based on a set of standards that are included in the Web Services Security (WS-Security) specification. These standards address how to provide protection for messages that are exchanged in a web services environment. The set of specification defines the core facilities for protecting the integrity and confidentiality of a message and provides mechanisms for associating security-related claims with the message." /> Enable Java 2 security with the console

message-level security into an application serving environment. Web Services Security for WAS is based on a set of standards that are included in the Web Services Security (WS-Security) specification. These standards address how to provide protection for messages that are exchanged in a web services environment. The set of specification defines the core facilities for protecting the integrity and confidentiality of a message and provides mechanisms for associating security-related claims with the message." /> Enable Java 2 security with scripting

Develop custom login modules

Enable resource security for J2C and JDBC data sources

Enable resource security for JavaMail

Implement a custom authentication provider using JASPI

Secure the application hosting environment. The counterpart of securing the applications before and after deployment is to secure the server hosting environment into which the applications are deployed.

Secure the administrative environment before installation

Secure the administrative environment after installation

Assign users to roles

Configure security with wsadmin scripting

By default, security is enabled out of box. You have an opportunity to modify the default whenever you create a profile, at installation time or any other time. If you do not deselect it, administrative security will be enabled for a profile. Out of box security authenticates users against the file-based federated repository powered by virtual member manager.

Enable and configure administrative security with the console

application security, global security, administrative security based on the LocalOS registry, and authentication mechanisms." /> Enable and configure administrative security with scripting

Authenticate users with the local operating system user registry

Authenticate users with an LDAP user registry

Authenticate with a custom user registry

realm can consist of identities in the file-based repository that is built into the system, in one or more external repositories, or in both the built-in, file-based repository and in one or more external repositories." /> Authenticate with the file-based federated repository

web applications require that SSO is enabled." /> Set up single sign-on (SSO)

Access secure resources using SSL and applet clients

Set up SSL between remote servers or clients and servers

CSIv2 (CSIv2) features including SSL client certificate authentication, message layer authentication, identity assertion, and security attribute propagation." /> Set up CSIv2

Configure an authorization provider

Troubleshoot security

+

Search Tips   |   Advanced Search