11.07.2015 Views

Borland VisiBroker® 7.0 - Borland Technical Publications

Borland VisiBroker® 7.0 - Borland Technical Publications

Borland VisiBroker® 7.0 - Borland Technical Publications

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security for the <strong>Borland</strong> web container# Default: none - by default mod_iiop2 does not request the orb to reap idleconnections.##IIopReapIdleConnections 50# uncomment the following to enable the "certificate passthrough" feature ofthe IIOP connector# Note: you must have already un-commented the SSLOptions directive of themod_ssl module earlier#IIopEnableSSLExport trueSecurity for the <strong>Borland</strong> web containerIn order to protect access to your web resources, you must secure those resources.The following steps are required for securing web resources using VisiBroker:1 Set up security for your <strong>Borland</strong> web container2 Set up security for each web applicationSecuring your <strong>Borland</strong> web containerBy default, the <strong>Borland</strong> web container is set up to use the <strong>Borland</strong> Security ServiceRealm (BSSRealm). To secure your <strong>Borland</strong> web container, you need to complete thefollowing:1 Enable security2 Configure Security authentication3 Configure Security authorizationSecuring your web applicationThe VisiBroker Server allows you to set security for each of your web applications byprotecting the URLs with which the application's resources are associated. To secure aweb application, you must first decide which URLs you want to protect. Once youprotect a URL, a user is not able to access it without entering a valid user name andpassword.Once you identify a web resource collection (servlets, JSPs, HTMLs, Gifs, and such)and the associated URLs your want to protect, the steps to securing the webapplication are:1 Define new security roles: Assign users to a security role which is used to determinewho accesses the web resources and what actions are allowed when using the webresources by way of a web browser.2 Define the security constraints for the specific web resource files: Protect the URLPatterns that map to certain servlets and JSPs.3 Set up a login: Set the login option which controls the access to the servlets andJSPs through their URL patterns.For example, you may set up a “Developer” security role that can access the webresources of the example.war file which contains the URL Pattern, jsp/security/servlet/*.jsp.Chapter 8: Security for the Web components 83

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!