InfoCenter Home >
6: Administer applications >
6.6: Tools and resources quick reference >
6.6.18: Securing applications >
6.6.18.1: Securing applications

6.6.18.1: Securing applications

The table summarizes the security wizards provided for accomplishing the tasks necessary to secure an application.

Goal Wizard Conceptual overview Instructions
1. Enable security; set application security default and global values; specify how to authenticate users Configure Global Settings 6.6.18.1a 6.6.18.1.1a
2. Secure a particular application, making users authenticate their identities before using it Configure Application Security 6.6.18.1b 6.6.18.1.1b
3. Configure custom method groups as an optional step towards defining who will be allowed to access applications Configure Method Groups 6.6.18.1c 6.6.18.1.1c
4. Assign the methods in a resource, such as a servlet, to a custom or default method group for protection Configure Resource Security 6.6.18.1d 6.6.18.1.1d
5. Specify which users and groups can access which methods in which applications Configure Permissions 6.6.18.1e 6.6.18.1.1e

Test the application

At this point, your resources will be secure. A user who runs a client program that accesses secured resources will be prompted to log in. The user must log in with an account that has been granted access to the resources, otherwise the user will be denied access. The visible effect of this denial is that the client program will trigger an authorization failure, for example, a java.rmi.ServerException that contains a com.ibm.ejs.EJSSecurityException.

Go to previous article: Securing applications Go to next article: Securing applications

 

 
Go to previous article: Securing applications Go to next article: Securing applications