Chapters in this Guide

This guide is in two parts. Part 1 consists of the following chapters, which provide a high-level overview of the IBM Cúram Social Program Management security architecture for the application and deployment to application servers:

Chapter 2 Authentication
This chapter describes the authentication architecture for IBM Cúram Social Program Management, giving a detailed description of each area and any customizable points available.
Chapter 3 Authorization
This chapter describes how authorization works and how this can be configured for users.
Chapter 4 Cryptography in Cúram
This chapter describes how IBM Cúram Social Program Management uses cryptography to secure passwords.
Chapter 5 Security Data Caching
This chapter describes the in-built Cúram Security Cache and also describes the IBM® WebSphere® Application Server cache and how it affects user authentication.
Chapter 6 Security for Alternative Clients
This chapter describes the usernames that must exist on the Cúram Users database table to ensure processes like Workflow can run successfully.
Chapter 7 External User Applications
This chapter describes why an external user application would be needed and what should be considered for this.
Chapter 8 Using Single Sign On
This chapter describes the application server properties that must be considered when IBM Cúram Social Program Management will be used in a Single Sign On solution.
Chapter 9 Other Security Considerations
This chapter gives a brief overview of some external security practices and considerations.

Part 2 consists of the following chapters, which provide several how-to's on development activities for coding and customizing security:

Chapter 10 Customizing Authentication
This chapter describes customization points and development artefacts relevant to authentication.
Chapter 11 Customizing Authorization
This chapter describes how to implement authorization for IBM Cúram Social Program Management.
Chapter 12 Customizing Cryptography
This chapter describes how to customize Cúram's use of cryptography.
Chapter 13 Customizing External User Applications
This chapter describes how to develop an external user application.