IBM WebSphere application server v7.0 secruity :: secure your WebSphere applications with Java EE and JAAS security standards /
Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham [UK] :
Packt Pub./Enterprise,
2011.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook. |
Beschreibung: | 1 online resource (viii, 290 pages) : illustrations (some color) |
ISBN: | 9781849681490 184968149X 1849681481 9781849681483 1283016133 9781283016131 9786613016133 6613016136 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn712649355 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 110414s2011 enka o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d E7B |d UMI |d OCLCQ |d COO |d OCLCQ |d DEBSZ |d OCLCQ |d DKDLA |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AZK |d OCLCO |d JBG |d LOA |d OCLCF |d AGLDB |d COCUF |d CNNOR |d MOR |d PIFAG |d OCLCQ |d U3W |d OCLCO |d OCL |d BRL |d STF |d WRM |d VTS |d CEF |d INT |d VT2 |d OCLCQ |d OCLCO |d OCLCQ |d UAB |d A6Q |d OCLCQ |d M8D |d HS0 |d ADU |d VLY |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
019 | |a 741364934 |a 961563537 |a 962681745 |a 968286478 |a 974670824 |a 974769596 |a 981864204 |a 988492578 |a 992112144 |a 1005952756 |a 1018022722 |a 1037453285 |a 1038651405 |a 1053604433 |a 1055384371 |a 1081227087 |a 1083471700 |a 1083592468 |a 1083605657 |a 1100833507 |a 1103250217 |a 1112852041 |a 1129365314 |a 1153052812 |a 1162425154 |a 1241883919 |a 1274131638 |a 1274139492 |a 1290073969 |a 1300673058 | ||
020 | |a 9781849681490 |q (electronic bk.) | ||
020 | |a 184968149X |q (electronic bk.) | ||
020 | |a 1849681481 | ||
020 | |a 9781849681483 | ||
020 | |z 9781849681483 | ||
020 | |a 1283016133 | ||
020 | |a 9781283016131 | ||
020 | |a 9786613016133 | ||
020 | |a 6613016136 | ||
035 | |a (OCoLC)712649355 |z (OCoLC)741364934 |z (OCoLC)961563537 |z (OCoLC)962681745 |z (OCoLC)968286478 |z (OCoLC)974670824 |z (OCoLC)974769596 |z (OCoLC)981864204 |z (OCoLC)988492578 |z (OCoLC)992112144 |z (OCoLC)1005952756 |z (OCoLC)1018022722 |z (OCoLC)1037453285 |z (OCoLC)1038651405 |z (OCoLC)1053604433 |z (OCoLC)1055384371 |z (OCoLC)1081227087 |z (OCoLC)1083471700 |z (OCoLC)1083592468 |z (OCoLC)1083605657 |z (OCoLC)1100833507 |z (OCoLC)1103250217 |z (OCoLC)1112852041 |z (OCoLC)1129365314 |z (OCoLC)1153052812 |z (OCoLC)1162425154 |z (OCoLC)1241883919 |z (OCoLC)1274131638 |z (OCoLC)1274139492 |z (OCoLC)1290073969 |z (OCoLC)1300673058 | ||
037 | |a CL0500000097 |b Safari Books Online | ||
050 | 4 | |a TK5105.8885.W43 |b S55 2011eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Siliceo, Omar. | |
245 | 1 | 0 | |a IBM WebSphere application server v7.0 secruity : |b secure your WebSphere applications with Java EE and JAAS security standards / |c Omar Siliceo. |
260 | |a Birmingham [UK] : |b Packt Pub./Enterprise, |c 2011. | ||
300 | |a 1 online resource (viii, 290 pages) : |b illustrations (some color) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view | |
505 | 8 | |a WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice | |
505 | 8 | |a Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console | |
505 | 8 | |a Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories | |
505 | 8 | |a AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources | |
520 | |a Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook. | ||
546 | |a English. | ||
630 | 0 | 0 | |a WebSphere. |0 http://id.loc.gov/authorities/names/n2001002465 |
630 | 0 | 7 | |a WebSphere. |2 blmlsh |
630 | 0 | 7 | |a WebSphere |2 fast |
650 | 0 | |a Electronic commerce |x Security measures. | |
650 | 0 | |a Web servers |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Commerce électronique |x Sécurité |x Mesures. | |
650 | 6 | |a Serveurs Web |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Electronic commerce |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
758 | |i has work: |a IBM WebSphere application server v7.0 security (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3wmhjTM3QVyyPQ4Jmq373 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Siliceo, Omar. |t IBM WebSphere application server v7.0 secruity. |d Birmingham, [U.K.] : Packt Pub./Open Source, 2011 |z 9781849681483 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=358696 |3 Volltext |
938 | |a ebrary |b EBRY |n ebr10450980 | ||
938 | |a EBSCOhost |b EBSC |n 358696 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn712649355 |
---|---|
_version_ | 1816881755922104320 |
adam_text | |
any_adam_object | |
author | Siliceo, Omar |
author_facet | Siliceo, Omar |
author_role | |
author_sort | Siliceo, Omar |
author_variant | o s os |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.8885.W43 S55 2011eb |
callnumber-search | TK5105.8885.W43 S55 2011eb |
callnumber-sort | TK 45105.8885 W43 S55 42011EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources |
ctrlnum | (OCoLC)712649355 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07122cam a2200757 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn712649355</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">110414s2011 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">JBG</subfield><subfield code="d">LOA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UAB</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">HS0</subfield><subfield code="d">ADU</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">741364934</subfield><subfield code="a">961563537</subfield><subfield code="a">962681745</subfield><subfield code="a">968286478</subfield><subfield code="a">974670824</subfield><subfield code="a">974769596</subfield><subfield code="a">981864204</subfield><subfield code="a">988492578</subfield><subfield code="a">992112144</subfield><subfield code="a">1005952756</subfield><subfield code="a">1018022722</subfield><subfield code="a">1037453285</subfield><subfield code="a">1038651405</subfield><subfield code="a">1053604433</subfield><subfield code="a">1055384371</subfield><subfield code="a">1081227087</subfield><subfield code="a">1083471700</subfield><subfield code="a">1083592468</subfield><subfield code="a">1083605657</subfield><subfield code="a">1100833507</subfield><subfield code="a">1103250217</subfield><subfield code="a">1112852041</subfield><subfield code="a">1129365314</subfield><subfield code="a">1153052812</subfield><subfield code="a">1162425154</subfield><subfield code="a">1241883919</subfield><subfield code="a">1274131638</subfield><subfield code="a">1274139492</subfield><subfield code="a">1290073969</subfield><subfield code="a">1300673058</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849681490</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">184968149X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849681481</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849681483</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849681483</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283016133</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283016131</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613016133</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613016136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)712649355</subfield><subfield code="z">(OCoLC)741364934</subfield><subfield code="z">(OCoLC)961563537</subfield><subfield code="z">(OCoLC)962681745</subfield><subfield code="z">(OCoLC)968286478</subfield><subfield code="z">(OCoLC)974670824</subfield><subfield code="z">(OCoLC)974769596</subfield><subfield code="z">(OCoLC)981864204</subfield><subfield code="z">(OCoLC)988492578</subfield><subfield code="z">(OCoLC)992112144</subfield><subfield code="z">(OCoLC)1005952756</subfield><subfield code="z">(OCoLC)1018022722</subfield><subfield code="z">(OCoLC)1037453285</subfield><subfield code="z">(OCoLC)1038651405</subfield><subfield code="z">(OCoLC)1053604433</subfield><subfield code="z">(OCoLC)1055384371</subfield><subfield code="z">(OCoLC)1081227087</subfield><subfield code="z">(OCoLC)1083471700</subfield><subfield code="z">(OCoLC)1083592468</subfield><subfield code="z">(OCoLC)1083605657</subfield><subfield code="z">(OCoLC)1100833507</subfield><subfield code="z">(OCoLC)1103250217</subfield><subfield code="z">(OCoLC)1112852041</subfield><subfield code="z">(OCoLC)1129365314</subfield><subfield code="z">(OCoLC)1153052812</subfield><subfield code="z">(OCoLC)1162425154</subfield><subfield code="z">(OCoLC)1241883919</subfield><subfield code="z">(OCoLC)1274131638</subfield><subfield code="z">(OCoLC)1274139492</subfield><subfield code="z">(OCoLC)1290073969</subfield><subfield code="z">(OCoLC)1300673058</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000097</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.8885.W43</subfield><subfield code="b">S55 2011eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Siliceo, Omar.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IBM WebSphere application server v7.0 secruity :</subfield><subfield code="b">secure your WebSphere applications with Java EE and JAAS security standards /</subfield><subfield code="c">Omar Siliceo.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham [UK] :</subfield><subfield code="b">Packt Pub./Enterprise,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (viii, 290 pages) :</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">WebSphere.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2001002465</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">WebSphere.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">WebSphere</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web servers</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Commerce électronique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Serveurs Web</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">IBM WebSphere application server v7.0 security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3wmhjTM3QVyyPQ4Jmq373</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Siliceo, Omar.</subfield><subfield code="t">IBM WebSphere application server v7.0 secruity.</subfield><subfield code="d">Birmingham, [U.K.] : Packt Pub./Open Source, 2011</subfield><subfield code="z">9781849681483</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=358696</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10450980</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">358696</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn712649355 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:46Z |
institution | BVB |
isbn | 9781849681490 184968149X 1849681481 9781849681483 1283016133 9781283016131 9786613016133 6613016136 |
language | English |
oclc_num | 712649355 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (viii, 290 pages) : illustrations (some color) |
psigel | ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Packt Pub./Enterprise, |
record_format | marc |
spelling | Siliceo, Omar. IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards / Omar Siliceo. Birmingham [UK] : Packt Pub./Enterprise, 2011. 1 online resource (viii, 290 pages) : illustrations (some color) text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Print version record. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook. English. WebSphere. http://id.loc.gov/authorities/names/n2001002465 WebSphere. blmlsh WebSphere fast Electronic commerce Security measures. Web servers Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Commerce électronique Sécurité Mesures. Serveurs Web Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Electronic commerce Security measures fast Computer networks Security measures fast has work: IBM WebSphere application server v7.0 security (Text) https://id.oclc.org/worldcat/entity/E39PD3wmhjTM3QVyyPQ4Jmq373 https://id.oclc.org/worldcat/ontology/hasWork Print version: Siliceo, Omar. IBM WebSphere application server v7.0 secruity. Birmingham, [U.K.] : Packt Pub./Open Source, 2011 9781849681483 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=358696 Volltext |
spellingShingle | Siliceo, Omar IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards / Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources WebSphere. http://id.loc.gov/authorities/names/n2001002465 WebSphere. blmlsh WebSphere fast Electronic commerce Security measures. Web servers Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Commerce électronique Sécurité Mesures. Serveurs Web Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Electronic commerce Security measures fast Computer networks Security measures fast |
subject_GND | http://id.loc.gov/authorities/names/n2001002465 http://id.loc.gov/authorities/subjects/sh94001277 |
title | IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards / |
title_auth | IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards / |
title_exact_search | IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards / |
title_full | IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards / Omar Siliceo. |
title_fullStr | IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards / Omar Siliceo. |
title_full_unstemmed | IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards / Omar Siliceo. |
title_short | IBM WebSphere application server v7.0 secruity : |
title_sort | ibm websphere application server v7 0 secruity secure your websphere applications with java ee and jaas security standards |
title_sub | secure your WebSphere applications with Java EE and JAAS security standards / |
topic | WebSphere. http://id.loc.gov/authorities/names/n2001002465 WebSphere. blmlsh WebSphere fast Electronic commerce Security measures. Web servers Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Commerce électronique Sécurité Mesures. Serveurs Web Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Electronic commerce Security measures fast Computer networks Security measures fast |
topic_facet | WebSphere. WebSphere Electronic commerce Security measures. Web servers Security measures. Computer networks Security measures. Commerce électronique Sécurité Mesures. Serveurs Web Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Electronic commerce Security measures Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=358696 |
work_keys_str_mv | AT siliceoomar ibmwebsphereapplicationserverv70secruitysecureyourwebsphereapplicationswithjavaeeandjaassecuritystandards |