12.07.2015 Views

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

WebSphere Application Server <strong>for</strong> z/<strong>OS</strong> AND <strong>OS</strong>/390Finally, in a distributed network, how do you ensure that messages being passedare confidential <strong>and</strong> have not been tampered? How do you ensure that clients arewho they claim to be? How do you map network identities to z/<strong>OS</strong> or <strong>OS</strong>/390identities? These issues are addressed by the following support in WebSphere <strong>for</strong>z/<strong>OS</strong>:■■■The use of SSL <strong>and</strong> digital certificatesKerberosDistributed Computing Environment (DCE)Network security is not required <strong>for</strong> your initial installation <strong>and</strong> customization ofWebSphere <strong>for</strong> z/<strong>OS</strong>. This in<strong>for</strong>mation is provided to introduce you toWebSphere <strong>for</strong> z/<strong>OS</strong> security <strong>and</strong> allow you to make early planning decisionsabout system security. The following topics describe how WebSphere <strong>for</strong> z/<strong>OS</strong>supports security. The descriptions are organized under the following subtopics:■■Authorization CheckingUser Identification, Authentication <strong>and</strong> Network <strong>Security</strong>Authorization CheckingEach control region, server region, <strong>and</strong> client must have its own MVS user ID(more about user identification <strong>and</strong> authentication later). When a request flowsfrom a client to the server or from a server to a server, WebSphere <strong>for</strong> z/<strong>OS</strong>passes the user identity (client or server) with the request. Thus each request isper<strong>for</strong>med on behalf of the user identity <strong>and</strong> the system checks to see if the useridentity has the authority to make such a request.ControlAccess control lists in LDAPCBIND classDATASET classDCEUUIDS <strong>and</strong> IBMFACclassesDSNR classEJBROLE classIBMFA<strong>CA</strong>uthorizationControlled access to WebSphere <strong>for</strong> z/<strong>OS</strong>naming <strong>and</strong> interface repository dataAccess to a serverAccess to data setsMapping DCE credentials to <strong>Top</strong> <strong>Secret</strong> userIdsAccess to DB2Access to methods in enterprise beansSSL key rings, certificates <strong>and</strong> mappings(IRR.DIGTCERT.GENCERT) &(IRR.DIGTCERT.LIST) &(IRR.DIGTCERT.LISTRING)1–38 Cookbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!