Developing applications that use programmatic security

For some applications, declarative security is not sufficient to express the security model of the application. Use this topic to develop applications that use programmatic security.

About this task

IBM® WebSphere® Application Server provides security components that provide or collaborate with other services to provide authentication, authorization, delegation, and data protection. WebSphere Application Server also supports the security features that are described in the Java™ Platform, Enterprise Edition (Java EE) specification. An application goes through three stages before it is ready to run:
  • Development
  • Assembly
  • Deployment
Most of the security for an application is configured during the assembly stage. The security that is configured during the assembly stage is called declarative security because the security is declared or defined in the deployment descriptors. The declarative security is enforced by the security runtime. For some applications, declarative security is not sufficient to express the security model of the application. For these applications, you can use programmatic security.

Procedure

  1. Develop secure web applications. For more information, see Desenvolvendo com APIs de Segurança Programática para Aplicativos da Web.
  2. Develop servlet filters for form login processing. For more information, see Developing servlet filters for form login processing.
  3. Develop form login pages. For more information, see Customizing web application login.
  4. Develop enterprise bean component applications. For more information, see Developing with programmatic APIs for EJB applications.
  5. Develop with Java Authentication and Authorization Service to log in programmatically.

    For more information, see Desenvolvendo Logins Programáticos com o Java Authentication and Authorization Service.

  6. Develop your own Java EE security mapping module.

    For more information, see Configurando os logins programáticos para o JAAS (Java Authentication and Authorization Service).

  7. Develop custom user registries. For more information, see Developing stand-alone custom registries.
  8. Develop a custom interceptor for trust associations.

Ícone que indica o tipo de tópico Tópico de Tarefa



Ícone de registro de data e hora Última atualização: July 9, 2016 7:56
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=cord&product=was-nd-mp&topic=tsec_design
Nome do arquivo: tsec_design.html