Securing applications and their environment
Secure the application serving environment. This information applies generally to all types of applications deployed in the environment.
Part of your security framework WebSphere® Application Server plays an integral part of the multiple-tier enterprise computing framework. Based on open architecture, WebSphere Application Server provides many plug-in points to integrate with enterprise software components to provide end-to-end security.
Product security Security infrastructure and mechanisms protect Java Platform, Enterprise Edition (Java EE) resources and administrative resources, addressing your enterprise security requirements.
次主題
- How do I secure applications and their environments?
Follow these shortcuts to get started quickly with popular tasks. Task overview: Securing resources
WebSphere Application Server supports the Java™ Platform, Enterprise Edition (Java EE) model for creating, assembling, securing, and deploying applications. Applications are often created, assembled, and deployed in different phases and by different teams.Setting up, enabling and migrating security
You must address several issues prior to authenticating users, authorizing access to resources, securing applications, and securing communications. These security issues include migration, interoperability, and installation.Configuring multiple security domains
By default, all administrative and user applications in WebSphere Application Server use the global security configuration. For example, a user registry defined in global security is used to authenticate users for every application in the cell. Out-of-the-box, this behavior is the same as it was in previous releases of WebSphere Application Server. You can create additional WebSphere security domains if you want to specify different security attributes for some or all of your user applications. This section describes how to configure a security domain by using the administrative console.Authenticating users
The process of authenticating users involves a user registry and an authentication mechanism. Optionally, you can define trust between WebSphere Application Server and a proxy server, configure single sign-on capability, and specify how to propagate security attributes between application servers.Authorizing access to resources
WebSphere Application Server provides many different methods for authorizing accessing resources. For example, you can assign roles to users and configure a built-in or external authorization provider.維護通訊安全
WebSphere Application Server 提供數種方法來維護伺服器和用戶端之間通訊的安全。Developing extensions to the WebSphere security infrastructure
WebSphere Application Server provides various plug points so that you can extend the security infrastructure. Extending this security infrastructure involves several activities including: Developing custom user registries, developing applications that use programmatic security, and customizing web application login forms.Auditing the security infrastructure
You can use the Auditing Facility to report and track auditable events to ensure the integrity of your system.Tuning, hardening, and maintaining security configurations
After installing WebSphere Application Server, there are several considerations for tuning, strengthening, and maintaining your security configuration.Troubleshooting security configurations
The following topics help to troubleshoot specific problems that are related to configuring and enabling security configurations.目錄使用慣例
產品資訊中指向 app_server_root、profile_root 及其他目錄的參照,隱含特定的預設目錄位置。 請熟悉 WebSphere Application Server 中的使用慣例。- Securing the application server by using HTTP Strict Transport Security (HSTS)
You can secure the application server by first setting up HTTP Strict Transport Security (HSTS) in IBM® HTTP Server. Then, add IBM HTTP Server as a front end to your application server environment so that connections between your application server and a client are over HTTPS. Securing client applications
This page provides a starting point for finding information about application clients and client applications. Application clients provide a framework on which application code runs, so that your client applications can access information on the application server.保護資料存取資源的安全
此頁面提供尋找資料存取相關資訊的起始點。各種企業資訊系統 (EIS) 利用不同的方法來儲存資料。這些後端資料儲存庫可能是關聯式資料庫、程序化交易程式或物件導向資料庫。維護 EJB 應用程式安全
此頁面提供尋找 Enterprise Bean 相關資訊的起始點。Securing messaging resources
This page provides a starting point for finding information about the use of asynchronous messaging resources for enterprise applications with WebSphere Application Server.Securing Mail, URLs, and other Java EE resources
This page provides a starting point for finding information about resources that are used by applications that are deployed on a Java Enterprise Edition (Java EE)-compliant application server. They include:Securing OSGi applications
This page provides a starting point for finding out how to secure OSGi applications.Securing portlet applications
This page provides a starting point for finding information about portlet applications, which are special reusable Java servlets that appear as defined regions on portal pages. Portlets provide access to many different applications, services, and web content.保護服務整合的安全
此頁面提供尋找服務整合相關資訊的起始點。Securing a service map
This page provides a starting point for finding out how to secure a service map.保護階段作業起始通訊協定 (SIP) 應用程式安全
這個頁面提供了一個起始點,可用來尋找 SIP 應用程式的相關資訊,SIP 應用程式為使用至少一個已寫入 JSR 116 規格之「階段作業起始通訊協定 (SIP)」Servlet 的 Java 程式。維護 Web 應用程式安全
此頁面提供了一個起始點,可尋找 Web 應用程式的相關資訊;這些 Web 應用程式是由可以當作一個單元來管理的一或多個相關檔案組成,其中包括:保護 Web 服務的安全
此頁面提供尋找 Web 服務相關資訊的起始點。


http://www14.software.ibm.com/webapp/wsbroker/redirect?version=cord&product=was-nd-mp&topic=welc6topsecuring
檔名:welc6topsecuring.html