Borland VisiBroker® 7.0 - Borland Technical Publications
Borland VisiBroker® 7.0 - Borland Technical Publications Borland VisiBroker® 7.0 - Borland Technical Publications
Security ProfilesThe left pane of the Authorization Settings dialog presents a tree view of the roles andtheir associated rules within the selected authorization domain. Selecting a node in thetree displays information about that node. There are three levels of nodes:■domain: this node level shows the name of the rolemap file corresponding to theauthorization domain. Its child nodes are roles. Selecting this node displays theentire rolemap file.■role: this node represents a particular role within the domain. Selecting this nodedisplays its role entry within the Role DB. Its child nodes are rules.■rule: this node represents an access rule for its parent role. Selecting this nodedisplays the rule entry within the corresponding role entry.58 VisiBroker Security Guide
Security ProfilesWorking with Authorization Rolemaps and DomainsTo edit the authorization rolemap:1 Open the Authorization Settings dialog.2 Select the domain node in the left-hand pane. The authorization rolemap fileappears.3 Edit the file in the content window.4 When you are finished, Click OK.To add a new authorization rolemap:1 Open the Authorization Settings Dialog.2 Click the Add button. The Add Domain dialog appears.3 Enter a name for the new domain to which the new rolemap will belong and clickOK.4 The new rolemap is presented in the Authorization Settings dialog. You can switchto other rolemaps using the drop-down list at the top of the window.5 Add roles and rules as necessary.6 Click OK when you are finished.To clone an existing rolemap:1 Open the Authorization Settings Dialog.2 Click Clone. The Clone Domain dialog appears.3 Enter a name for the new domain to which the cloned rolemap will belong and clickOK.4 The new rolemap is presented in the Authorization Settings dialog. You can switchto other rolemaps using the drop-down list at the top of the window.5 Add or edit roles and rules as necessary.6 Click OK when you are finished.To remove an authorization domain and its rolemap:1 Open the Authorization Settings dialog.2 Select the domain you wish to remove from the drop-down box at the top of theWindow.3 Click the Remove button. The domain is deleted.4 Click OK when you are finished.Chapter 5: Configuring Security Profiles for Domains 59
- Page 13 and 14: Chapter2Getting Started with Securi
- Page 15 and 16: Basic security model■■■■Web
- Page 17 and 18: Distributed environments and VisiSe
- Page 19 and 20: Authentication and IdentificationAu
- Page 21 and 22: Authentication and IdentificationDi
- Page 23 and 24: Secure TransportationSecure Transpo
- Page 25 and 26: Context PropagationContext Propagat
- Page 27 and 28: Context PropagationTrusting Asserti
- Page 29 and 30: Using IIOP/HTTPSHere are several ex
- Page 31 and 32: ChapterChapter 3AuthenticationJAAS
- Page 33 and 34: Authentication mechanisms and Login
- Page 35 and 36: LoginContext class and LoginModule
- Page 37 and 38: Associating a LoginModule with a re
- Page 39 and 40: Borland LoginModulesThe elements in
- Page 41 and 42: Borland LoginModulesLDAP LoginModul
- Page 43 and 44: Server and Client IdentificationIn
- Page 45 and 46: Server and Client IdentificationCre
- Page 47 and 48: Server and Client IdentificationCli
- Page 49 and 50: ChapterChapter4AuthorizationAuthori
- Page 51 and 52: Defining access control with Role D
- Page 53 and 54: Authorization domainsTo accomplish
- Page 55 and 56: CORBA authorizationwhere is a taut
- Page 57 and 58: Chapter5Configuring Security Profil
- Page 59 and 60: Security ProfilesEnabling SecurityF
- Page 61 and 62: Security ProfilesConfiguring Authen
- Page 63: Security ProfilesTo access the Auth
- Page 67 and 68: Security ProfilesAdding and Removin
- Page 69 and 70: Associating a Profile with a Domain
- Page 71 and 72: Chapter6Making Secure Connections (
- Page 73 and 74: Steps to secure clients and servers
- Page 75 and 76: Examining SSL related informationEx
- Page 77 and 78: Chapter7Making Secure Connections (
- Page 79 and 80: Steps to secure clients and servers
- Page 81 and 82: Creating Custom PluginsLoginModules
- Page 83 and 84: ChapterChapter8Security for the Web
- Page 85 and 86: Security for the Apache web serverC
- Page 87 and 88: Enabling certificate passthrough to
- Page 89 and 90: Security for the Borland web contai
- Page 91 and 92: Three-tier authorization schemeNote
- Page 93 and 94: Chapter9Security Properties for Jav
- Page 95 and 96: Security Properties for JavaPropert
- Page 97 and 98: Chapter10Security Properties for C+
- Page 99 and 100: Security Properties for C++Property
- Page 101 and 102: Chapter11VisiSecure for C++ APIsCha
- Page 103 and 104: General APIUse this to login to the
- Page 105 and 106: General APISets the cipher suites t
- Page 107 and 108: General APIReturnsA set of the publ
- Page 109 and 110: SSL APISSL APIThis section explains
- Page 111 and 112: SSL APIclass CipherSuiteNameThis cl
- Page 113 and 114: SSL APIExceptionsCORBA::BAD_OPERATI
Security ProfilesWorking with Authorization Rolemaps and DomainsTo edit the authorization rolemap:1 Open the Authorization Settings dialog.2 Select the domain node in the left-hand pane. The authorization rolemap fileappears.3 Edit the file in the content window.4 When you are finished, Click OK.To add a new authorization rolemap:1 Open the Authorization Settings Dialog.2 Click the Add button. The Add Domain dialog appears.3 Enter a name for the new domain to which the new rolemap will belong and clickOK.4 The new rolemap is presented in the Authorization Settings dialog. You can switchto other rolemaps using the drop-down list at the top of the window.5 Add roles and rules as necessary.6 Click OK when you are finished.To clone an existing rolemap:1 Open the Authorization Settings Dialog.2 Click Clone. The Clone Domain dialog appears.3 Enter a name for the new domain to which the cloned rolemap will belong and clickOK.4 The new rolemap is presented in the Authorization Settings dialog. You can switchto other rolemaps using the drop-down list at the top of the window.5 Add or edit roles and rules as necessary.6 Click OK when you are finished.To remove an authorization domain and its rolemap:1 Open the Authorization Settings dialog.2 Select the domain you wish to remove from the drop-down box at the top of theWindow.3 Click the Remove button. The domain is deleted.4 Click OK when you are finished.Chapter 5: Configuring Security Profiles for Domains 59