Access control

Access control refers to ensuring that an authenticated user has the permissions necessary to access resources or to perform a specific operation.

When a general user is authenticated to theWebSphere Process Server it is important for security that not every possible operation is available to that user. Allowing some users to perform certain tasks, while denying these tasks to other users is termed access control.

Access control can be arranged for components that you develop to make them secure. You do this by using service component architecture qualifiers at development time. See the IBM WebSphere Integration Developer documentation for more information.

Some WebSphere Process Server components, packaged as enterprise archive (EAR) files, secure their operation using J2EE role-based security. Details of these components are provided. The Business Process Choreographer and the Common Event Infrastructure are installed as part of WebSphere Process Server. The role-based security associated with these components is outlined in detail in subsequent topics.


Last updated: Tue 24 Oct 2006 22:01:09

(c) Copyright IBM Corporation 2005, 2006.
This information center is powered by Eclipse technology (http://www.eclipse.org)