Book description
This IBM® Redbooks® publication was written with the objective to provide a technical description of some of the most important security scenarios available with WebSphere® Application Server Version 6.1 for z/OS®. We chose scenarios that are not really documented elsewhere and that have had significant changes in Version 6.1.
In the first two chapters we provide an overview of security with WAS on z/OS for those readers who are unfamiliar with the security landscape on z/OS. From Chapter 3, "Web container security" on page 63, onwards we go into more technical depth.
Table of contents
- Notices
- Preface
- Chapter 1: Introduction
-
Chapter 2: WebSphere security design
- Chapter objectives
- Network protocol architecture overview
- SSL overview
- Authorization and EJB roles
-
Our scenarios
- Scenario 1 - authentication in HTTP server
- Scenario 2 - authentication in reverse proxy security server
- Scenario 3 - J2EE client authentication using CSIv2
- Scenario 4 - J2EE server authentication using CSIv2
- Scenario 5 - JCA custom principal mapping
- Scenario 6 - Web services authentication
- Scenario 7 - WMQ client authentication
- Scenario 8 - authorization using external authorization server
- Scenario 9 - bridged security between z/OS and distributed using JAAS
- Scenario 10 - centralized user registry using LDAP on z/OS
- Chapter 3: Web container security
- Chapter 4: Application security
- Chapter 5: Web services security introduction
-
Chapter 6: Web services message layer security
- How to configure Web services message layer security
-
Authentication with a security token
- Authentication support with WS-Security
- Authentication scenario description
- Authentication configuration overview
- Configuring the Web service requestor for security token
- Configuring the z/OS Web service provider for security token (1/2)
- Configuring the z/OS Web service provider for security token (2/2)
- Validating authentication with a security token
-
Integrity with XML digital signature
- Integrity support with WS-Security
- Integrity scenario description
- Integrity configuration overview
- Configuring the requestor for request XML digital signature (1/3)
- Configuring the requestor for request XML digital signature (2/3)
- Configuring the requestor for request XML digital signature (3/3)
- Configuring the z/OS provider for request XML digital signature (1/2)
- Configuring the z/OS provider for request XML digital signature (2/2)
- Configuring the z/OS provider for response XML digital signature
- Configuring the requestor for response XML digital signature
- Validating integrity with XML digital signature
-
Confidentiality with XML encryption
- Confidentiality support with WS-Security
- Confidentiality scenario description
- Confidentiality scenario key prerequisites
- Confidentiality configuration overview
- Configuring the requestor for request XML encryption (1/2)
- Configuring the requestor for request XML encryption (2/2)
- Configuring the z/OS provider for request XML encryption
- Configuring the z/OS provider for response XML encryption
- Configuring the z/OS requestor for response XML encryption
- Validating confidentiality with XML encryption
- Confidentiality using hardware cryptography
-
Identity assertion
- Identity assertion support with WS-Security
- Identity assertion scenario description
- Identity assertion configuration overview
- Configuring the Web service requestor for identity assertion
- Configuring the z/OS Web service provider for identity assertion
- Configuring the trust relationship for identity assertion
- Validating identity assertion
- Chapter 7: Secure Sockets Layer (SSL)
-
Chapter 8: Web services transport security
- Authentication with HTTP
-
Integrity with SSL
- Integrity with SSL scenario description
- Integrity scenario prerequisites
- Configuring the z/OS Web service provider SSL configuration (1/2)
- Configuring the z/OS Web service provider SSL configuration (2/2)
- Configuring the Web service requestor SSL configuration
- Configuring the z/OS Web service provider for integrity
- Configuring the Web service requestor for integrity
- Validating integrity with SSL
-
Confidentiality with SSL
- Confidentiality with SSL scenario description
- Configuring the z/OS Web service provider SSL configuration
- Configuring the Web service requestor SSL configuration
- Configuring the z/OS Web service provider for confidentiality
- Configuring the Web service requestor for confidentiality
- Validating confidentiality with SSL
-
Confidentiality with SSL using hardware crypto
- Confidentiality with SSL using hardware crypto prerequisites
- Installing the unrestricted Java policy jars
- Updating the JVM to use the IBMJCECCA provider
- Configuring the z/OS Web service provider SSL configuration
- Configuring the Web service requestor SSL configuration
- Configuring the z/OS Web service provider for confidentiality
- Configuring the Web service requestor for confidentiality
- Validating confidentiality with SSL using hardware crypto
- Confidentiality and basic authentication
-
Confidentiality and client certificate authentication
- Confidentiality and client certificate scenario description
- Confidentiality and client certificate prerequisites
- Configuring the z/OS Web service provider SSL configuration
- Configuring the Web service requestor SSL configuration
- Configuring z/OS Web service provider for authentication
- Validating client certificate authentication
-
Chapter 9: Security attribute propagation and CSIv2
- Introduction, logins, and tokens
- Horizontal attribute propagation
-
CSIv2 standard identity assertion
- CSIv2
- CSIv2 standard identity assertion description
- CSIv2 standard identity assertion in action
- CSIv2 standard identity assertion implementation (1/3)
- CSIv2 standard identity assertion implementation (2/3)
- CSIv2 standard identity assertion implementation (3/3)
- Our CSIv2 identity assertion scenario (1/2)
- Our CSIv2 identity assertion scenario (2/2)
- Vertical attribute propagation with CSIv2
- Chapter 10: User registries
-
Chapter 11: SPNEGO and Windows single sign-on
- Introducing the SPNEGO TAI
- Designing single sign-on with Microsoft Windows domain
-
Implementing single sign-on using SPNEGO TAI
- Our environment and our scenario
- Configuring the Microsoft Windows server (1/2)
- Configuring the Microsoft Windows server (2/2)
- Configuring WebSphere Application Server for z/OS (1/2)
- Configuring WebSphere Application Server for z/OS (2/2)
- Configuring the Web browser
- Tips for troubleshooting the SPNEGO TAI configuration
- Validating single sign-on using the SPNEGO TAI
- Chapter 12: Operating system security
- Chapter 13: WAS administrative security
- Appendix A: Additional material
- Related publications
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: Security in WebSphere Application Server V6.1 and J2EE 1.4 on z/OS
- Author(s):
- Release date: December 2007
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
IBM WebSphere Application Server Liberty Profile Guide for Developers
IBM® WebSphere® Application Server V8.5 includes a Liberty profile, which is a highly composable, dynamic application …
book
WebSphere Application Server Liberty Profile Guide for Developers
IBM WebSphere® Application Server V8.5 includes a Liberty profile, which is a highly composable, dynamic application …
book
IBM WebSphere Application Server V8.5 Administration and Configuration Guide for Liberty Profile
IBM® WebSphere® Application Server V8.5 includes a Liberty profile, which is a highly composable, dynamic application …
book
WebSphere Application Server V6.1 Problem Determination: IBM Redpaper Collection
This IBM Redbooks publication is a collection of previously published Redpapers. This publication allows for easy …