Borland VisiBroker® 7.0 - Borland Technical Publications
Borland VisiBroker® 7.0 - Borland Technical Publications Borland VisiBroker® 7.0 - Borland Technical Publications
42 VisiBroker Security Guide
ChapterChapter4AuthorizationAuthorization is the process of verifying that the user has the authority to perform therequested operations on the server. For example, when a client accesses an enterprisebean method the application server must verify that the user of the client has theauthority to perform such an access. Authorization occurs after authentication(confirming the user's identity).Authorization is based on the user's identity and an access control list (ACL), which is alist of who can access designated functions. Typically, an access control list specifies aset of roles that can use a particular resource. It also designates the set of peoplewhose attributes match those of particular roles, and who are then allowed to performactions in those roles.Borland uses an access control scheme based on roles. The deployment descriptormaintains a list of roles that are authorized to access each enterprise bean method.The Borland Security Service uses a role database (Role DB) to associate useridentities with EJB roles. If a user is associated with at least one allowed role, the usermay access the method.Defining access control with Role DBRole DB is a text file containing the roles and the access IDs associated with thoseroles. Each role in Role DB constitutes a role entry.In VisiBroker, the Role DB file is located with the Security Profiles in the BorlandDeployment Platform installation footprint:/var/security/profiles//The default Role DB, default.rolemap, is located in:/var/security/profiles/default/default.rolemapIn VisiBroker, the location of the rolemap file is specified through the propertyvbroker.security.domain..rolemap_pathChapter 4: Authorization 43
- Page 1 and 2: Security GuideBorlandVisiBroker ®
- Page 3 and 4: ContentsChapter 1Introduction to Bo
- Page 5 and 6: Security for the Borland web contai
- Page 7 and 8: Chapter1Introduction to Borland Vis
- Page 9 and 10: VisiBroker DocumentationImportant
- Page 11 and 12: Contacting Borland support■■■
- Page 13 and 14: Chapter2Getting Started with Securi
- Page 15 and 16: Basic security model■■■■Web
- Page 17 and 18: Distributed environments and VisiSe
- Page 19 and 20: Authentication and IdentificationAu
- Page 21 and 22: Authentication and IdentificationDi
- Page 23 and 24: Secure TransportationSecure Transpo
- Page 25 and 26: Context PropagationContext Propagat
- Page 27 and 28: Context PropagationTrusting Asserti
- Page 29 and 30: Using IIOP/HTTPSHere are several ex
- Page 31 and 32: ChapterChapter 3AuthenticationJAAS
- Page 33 and 34: Authentication mechanisms and Login
- Page 35 and 36: LoginContext class and LoginModule
- Page 37 and 38: Associating a LoginModule with a re
- Page 39 and 40: Borland LoginModulesThe elements in
- Page 41 and 42: Borland LoginModulesLDAP LoginModul
- Page 43 and 44: Server and Client IdentificationIn
- Page 45 and 46: Server and Client IdentificationCre
- Page 47: Server and Client IdentificationCli
- Page 51 and 52: Defining access control with Role D
- Page 53 and 54: Authorization domainsTo accomplish
- Page 55 and 56: CORBA authorizationwhere is a taut
- Page 57 and 58: Chapter5Configuring Security Profil
- Page 59 and 60: Security ProfilesEnabling SecurityF
- Page 61 and 62: Security ProfilesConfiguring Authen
- Page 63 and 64: Security ProfilesTo access the Auth
- Page 65 and 66: Security ProfilesWorking with Autho
- Page 67 and 68: Security ProfilesAdding and Removin
- Page 69 and 70: Associating a Profile with a Domain
- Page 71 and 72: Chapter6Making Secure Connections (
- Page 73 and 74: Steps to secure clients and servers
- Page 75 and 76: Examining SSL related informationEx
- Page 77 and 78: Chapter7Making Secure Connections (
- Page 79 and 80: Steps to secure clients and servers
- Page 81 and 82: Creating Custom PluginsLoginModules
- Page 83 and 84: ChapterChapter8Security for the Web
- Page 85 and 86: Security for the Apache web serverC
- Page 87 and 88: Enabling certificate passthrough to
- Page 89 and 90: Security for the Borland web contai
- Page 91 and 92: Three-tier authorization schemeNote
- Page 93 and 94: Chapter9Security Properties for Jav
- Page 95 and 96: Security Properties for JavaPropert
- Page 97 and 98: Chapter10Security Properties for C+
42 VisiBroker Security Guide