+

Search Tips   |   Advanced Search

(ZOS) WAS security for z/OS

WebSphere Application Server for z/OS supports access to resources by clients and servers in a distributed environment. Determine how to control access to these resources and prevent inadvertent or malicious destruction of the system or data.

These are the pieces in the distributed network that consider:

If we need to protect resources, it is critical that you identify who accesses those resources. Thus, any security system requires client (user) identification, also known as authentication. In a distributed network supported by WAS for z/OS, clients can access resources from:

Additionally, clients can request a service that requires a server to forward the request to another cluster. In such cases, the system must handle delegation, the availability of the client identity for use by intermediate clusters and target clusters.

Finally, in a distributed network, how do you verify that messages being passed are confidential and have not been tampered? How do you verify that clients are who they claim to be? How do you map network identities to z/OS identities? These issues are addressed by the following support in WAS for z/OS:


Subtopics


Related:

  • Federated repositories
  • Prepare for security at installation time
  • Select a registry or repository
  • Use distributed identity mapping for SAF
  • PropFilePasswordEncoder command reference