InfoCenter Home >
6: Administer applications >
6.6: Tools and resources quick reference >
6.6.18: Securing applications >
6.6.18.1: Securing applications
The table summarizes the security wizards provided for accomplishing
the tasks necessary to secure an application.
Goal |
Wizard |
Conceptual overview |
Instructions |
1. Enable security; set application security default and global values;
specify how to authenticate users |
Configure Global Settings |
6.6.18.1a |
6.6.18.1.1a |
2. Secure a particular application, making users authenticate their identities
before using it |
Configure Application Security |
6.6.18.1b |
6.6.18.1.1b |
3. Configure custom method groups as an optional step towards
defining who will be allowed to access applications |
Configure Method Groups |
6.6.18.1c |
6.6.18.1.1c |
4. Assign the methods in a resource, such as a servlet, to a custom or
default method group for protection |
Configure Resource Security |
6.6.18.1d |
6.6.18.1.1d |
5. Specify which users and groups can access which methods in which applications |
Configure Permissions |
6.6.18.1e |
6.6.18.1.1e |
Test the application
At this point, your resources will be secure. A user who runs a
client program that accesses secured resources will be prompted
to log in. The user must log in with an account that has been
granted access to the resources, otherwise the user will be denied
access. The visible effect of this denial is that the client
program will trigger an authorization failure, for example,
a java.rmi.ServerException that contains a
com.ibm.ejs.EJSSecurityException.
|