This guide is in two parts. Part 1 consists of the following chapters, which provide a high-level overview of the IBM Cúram Social Program Management security architecture for the application and deployment to application servers:
- Chapter 2 Authentication
- This chapter describes the authentication architecture for IBM Cúram Social Program Management, giving a detailed description of each area and any customizable points available.
- Chapter 3 Authorization
- This chapter describes how authorization works and how this can be configured for users.
- Chapter 4 Cryptography in Cúram
- This chapter describes how IBM Cúram Social Program Management uses cryptography to secure passwords.
- Chapter 5 Security Data Caching
- This chapter describes the in-built Cúram Security Cache and also describes the IBM® WebSphere® Application Server cache and how it affects user authentication.
- Chapter 6 Security for Alternative Clients
- This chapter describes the usernames that must exist on the Cúram Users database table to ensure processes like Workflow can run successfully.
- Chapter 7 External User Applications
- This chapter describes why an external user application would be needed and what should be considered for this.
- Chapter 8 Using Single Sign On
- This chapter describes the application server properties that must be considered when IBM Cúram Social Program Management will be used in a Single Sign On solution.
- Chapter 9 Other Security Considerations
- This chapter gives a brief overview of some external security practices and considerations.
Part 2 consists of the following chapters, which provide several how-to's on development activities for coding and customizing security:
- Chapter 10 Customizing Authentication
- This chapter describes customization points and development artefacts relevant to authentication.
- Chapter 11 Customizing Authorization
- This chapter describes how to implement authorization for IBM Cúram Social Program Management.
- Chapter 12 Customizing Cryptography
- This chapter describes how to customize Cúram's use of cryptography.
- Chapter 13 Customizing External User Applications
- This chapter describes how to develop an external user application.