Server security settings

Use this page to configure server security and to override the global security settings. If you need to revert to the global security defaults, clear the appropriate check box in the administrative console.

To view this administrative console page, complete the following steps:
  1. Click Servers > Application servers > server_name.
  2. Under Security, click Server security.

You can disable security on individual application servers while global security is enabled. However, you cannot enable security on an individual application server while global security is disabled. While application server security is disabled for user requests, administrative and naming security is still enabled for that application server so that the administrative and naming infrastructure remains secure. To avoid problems, verify that the naming security has Everyone access to the naming function that you use within your user code. You do not need to configure administrative security because user code does not directly access administrative functions. User code accesses administrative functions through the supported scripting tools.

Configuration tab

Server-level security

Specifies whether the server overrides cell defaults for security.

To revert to the cell defaults for Server-level security, click Use cell security. Click Apply and Save, to validate the changes at the server level.

Default False

CSI

Specifies whether the server overrides cell defaults for the Common Secure Interoperability (CSI) protocol.

[AIX HP-UX Linux Solaris Windows] To revert back to the cell defaults for the CSI protocol, click Use cell CSI . Click Apply and then select Save to validate the changes at the server level.

Default False

SAS

Specifies whether the server overrides cell defaults for the Secure Authentication Service (SAS) or the z/OS Secure Authentication Service (z/SAS) protocol.

[AIX HP-UX Linux Solaris Windows] To revert back to the cell defaults for the SAS protocol, click Use cell SAS. Click Apply and Save, to validate the changes at the server level.

Default False



Related tasks
Securing specific application servers
Related reference
Java 2 security policy files
Reference topic    

Terms of Use | Feedback

Last updated: Aug 29, 2010 9:31:45 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=vela&product=was-nd-mp&topic=usecrgswc
File name: usec_rgswc.html