Access control

Access control refers to ensuring that an authenticated user has the permissions necessary to perform a specific operation.

When a user has authenticated themselves to theWebSphere Process Server, it is important for security that not every possible operation is available to the user. Allowing some users to perform certain tasks, while denying these tasks to other users is termed access control.

Access control can be arranged for components that you develop to make them secure. This is achieved using service component architecture qualifiers at development time. See the WebSphere Integration Developer Information Center for more information.

Some WebSphere Process Server components, packaged as enterprise archive (EAR) files, secure their operation using J2EE role-based security. Details of these components are provided. The Business Process Choreographer and the Common Event Infrastructure are installed as part of the WebSphere Process Server. The role-based security associated with these components is outlined in detail in subsequent topics.


Terms of use |

Last updated: Tue Feb 21 17:33:02 2006

(c) Copyright IBM Corporation 2005.
This information center is powered by Eclipse technology (http://www.eclipse.org)