Administering security

This section describes how to configure and administer security features with the administrative console, including: Global security, Authentication mechanisms (directories and user registries), Authorization policies and providers, including Java Authentication and Authorization Service (JAAS), Trust association interceptors, Single signon, Common Secure Interoperability Version 2 (CSIv2), Secure Sockets Layer (SSL), Java 2 Security manager and Security attribute propagation

Before you begin

You must have administrative access to the administrative console in order to perform this task.

Why and when to perform this task

Administering secure applications require access to the WebSphere Process Server administrative console. Log in with a valid user ID and password. To administer security, complete the following steps.

Steps for this task

  1. Configure global security.

    One important step that must be taken in configuring global security is to select the Lightweight Third Party Authentication (LTPA) as the active authentication mechanism. The Simple WebSphere Authentication Mechanism (SWAM) (which is the default active authentication mechanism in the administrative console) does not correctly propagate security credentials. SWAM is deprecated and will be removed from the administrative console in future releases.

    When global security is turned on , the administrative console and the wsadmin command require the user to provide authentication data and role based access control is enforced.

    For more information, see Configuring global security in the WebSphere Application Server Information Center.
  2. Assign users to administrator roles. For more information, see Assigning users to administrator roles in the WebSphere Application Server Information Center.
  3. Assign users to naming roles. For more information, see Assigning users to naming roles in the WebSphere Application Server Information Center.
  4. Configure trust association interceptors For more information, see Configuring trust association interceptors in the WebSphere Application Server Information Center.
  5. Configure Java Authentication and Authorization Service login. For more information, see Configuring application logins for Java Authentication and Authorization Service in the WebSphere Application Server Information Center.
  6. Configure security attribute propagation. For more information, see Security attribute propagation in the WebSphere Application Server Information Center.

Terms of use |

Last updated:

Copyright IBM Corporation 2005.
This information center is powered by Eclipse technology (http://www.eclipse.org)