Administration guide > Secure the deployment environment
Secure the deployment environment >
< Previous | Next >
Tutorial: Integrate WebSphere eXtreme Scale security in a mixed environment with an external authenticator
This tutorial demonstrates how to secure WebSphere eXtreme Scale servers that are partially deployed in a WAS environment.
In the deployment for this tutorial, the container servers are deployed in WAS. The catalog server is deployed as stand-alone server, and is started in a Java Standard Edition (Java SE) environment.
Because the catalog server is not deployed in WAS, you cannot use the WAS Authentication plug-ins. For more information about the process of configuring WAS Authentication plug-ins, see Tutorial: Integrate WebSphere eXtreme Scale security with WAS. In this tutorial, a different authenticator is required for catalog server authentication. You configure a keystore authenticator to authenticate the clients.
Learning objectivesThe learning objectives for this tutorial follow:
- Configure WebSphere eXtreme Scale to use the KeyStoreLoginAuthenticator plug-in
- Configure WebSphere eXtreme Scale transport security to use WAS CSIv2 configuration and the WebSphere eXtreme Scale properties file
- Use Java™ Authentication and Authorization Service (JAAS) authorization in WAS
- Use the xsadmin tool to monitor the data grids and maps that you created in the tutorial.
Time requiredThis tutorial takes approximately 4 hours from start to finish.
Security integration with WAS
Data grid authentication
Data grid security
Application client authentication
Application client authorization
Transport layer security and secure sockets layer
Java Management Extensions (JMX) security
Security integration with external providers
Enable local security
Start and stop secure servers
Secure the REST data service
Security descriptor XML file
Tutorial: Integrate WebSphere eXtreme Scale security with WAS
< Previous | Next >