InfoCenter Home >
6: Administer applications >
6.6: Tools and resources quick reference >
6.6.18: Securing applications >
6.6.18.1: Securing applications >
6.6.18.1.1d: Configuring resource security
- Start the Configure Resource Security task by one of two methods:
- By clicking Console -> Tasks -> Configure Resource Security from the
console menu bar.
- By clicking Configure Resource Security from the drop-down list on the
Wizards toolbar button.
- Specify the resource to which to apply security.
Note that servlets, JSP files, and Web pages are not represented directly,
but can be selected according to their "Web resource" configurations. Web resources
specify Web paths to these resources. If configuring resource security for
a servlet, JSP file, or Web page, select the appropriate Web resource.
- Click Next. A prompt asks whether to use the default method groups.
If you specify Yes, the security system will take a first pass at grouping
the methods of the resource into the default method groups. It will use the method
names to decide which groups to put them in.
For example, it will protect HTTP PUT methods with the WriteMethods group.
If you decline to use the default method groups, you will need to specify
a method group for each method in the resource.
The distribution of the methods into the
default method groups is not finalized until you finish this task wizard. You
can always try the default method groups, then reverse the operation if you
do not like the results. Just do not click the Finish button until you
are sure about the method groups!
- If the Finish button is available, click it. If configuring resource
security for an enterprise bean, click Next to proceed to a final panel for
specifying delegation settings.
- Click Finish.
If your Web server is already running when you configure resource
security for an HTML file, JSP file, or other Web resource, you need
to stop the WebSphere administrative server and start it again for
the change to take effect.
|
|