Manage Access Control

 

+

Search Tips   |   Advanced Search

 

Authorization

To administer access control, use the Resource Permissions, User and Group Permissions, and Manage Users and Groups portlets or the Portal Scripting Interface.

 

Authorization

Authorization is sometimes referred to as access control. Authorization determines what interactions a user is permitted to have with a resource or a service. Administrators configure access to resources or services by assigning roles to users and groups. WebSphere Portal supports fine-grained access control over resources. Users can select and view only those resources for which they have appropriate access rights. When rendering a resource, WebSphere Portal verifies that the user has appropriate rights to use the requested resource. Access rights are administered through the:

Access control information is accessible through the XML configuration interface. By default access control data is stored in the WebSphere Portal database. Alternately, you can configure an external security manager such as IBM Tivoli Access Manager for e-business, to host parts of the access control data and to manage role assignments.

All unauthenticated users are considered anonymous users. The access control component provides a dedicated virtual principal called Virtual Users and Groups to represent such users. Prior to authenticating, an anonymous user, represented by this virtual principal, has specific access to a resource or service. In order for users to benefit from user and group specific privileges they must successfully authenticate. Access control works independently from the authentication of actual users.

WebSphere Portal only protects resources and services. WAS protects J2EE artifacts (for example servlet URLs and Enterprise Java Beans methods) and it's artifacts (like server or node configurations).

 

WebSphere Portal Administrator and Security Administrator

The Administrator@Portal and Security Administrator@Portal roles contain a special permission that is not available to any other role. This permission allows the Administrator or Security Administrator to make arbitrary changes to the access control configuration of all resources. The Administrator and Security Administrator can create and delete roles, role assignments, and role blocks. If the configuration allows an external security manager such as IBM Tivoli Access Manager for e-business to manage role assignments, additional privileges need to be set to allow arbitrary changes to the access control configuration.  

Parent topic

Controlling access