WebSphere eXtreme Scale Administration Guide >



Secure the deployment environment


To protect the WebSphere eXtreme Scale data, eXtreme Scale can integrate with several security providers.

WebSphere eXtreme Scale can integrate with an external security implementation. This external implementation must provide authentication and authorization services for eXtreme Scale. eXtreme Scale has plug-in points to integrate with a security implementation. WebSphere eXtreme Scale has been successfully integrated with the following components:

eXtreme Scale uses the security provider for the following tasks:

eXtreme Scale has the following types of authorizations:

Map authorization

Clients or groups can be authorized to perform insert, read, update, evict or delete operations on maps.

ObjectGrid authorization

Clients or groups can be authorized to perform object or entity queries on object grids.

DataGrid agent authorization

Clients or groups can be authorized to allow DataGrid agents to be deployed to an ObjectGrid.

Server-side map authorization

Clients or groups can be authorized to replicate a server map to client side or create a dynamic index to the server map.

Administration authorization

Clients or groups can be authorized to perform administration tasks.

If you had security already enabled for the back end , remember that these security settings are no longer sufficient to protect the data. Security settings from the database or other datastore does not in any way transfer to the cache. You must separately protect the data that is now cached using the eXtreme Scale security mechanism, including authentication, authorization, and transport level security.


+

Search Tips   |   Advanced Search