Protecting Web And Enterprise Javabeans Modules; Configuring Access Control; Chapter 6, "Protecting Web And Enterprise Javabeans Modules; Section 6.1, "Configuring Access Control - Novell ACCESS MANAGER 3.1 SP2 - J2EE AGENT GUIDE 2010 Manual

J2ee agent guide
Table of Contents

Advertisement

Protecting Web and Enterprise
6
JavaBeans Modules
The J2EE Agent mechanisms for protecting Web and EJB (Enterprise JavaBeans) modules have far
more granularity than what you can configure on the J2EE application server. With the agent, you
can be selective of what you are protecting. For a Web application, you can select to protect a
specific page or group of pages. For an Enterprise JavaBean, you can select to protect a bean, an
interface, a method, or a parameter. After selecting the granularity of the resource you want to
protect, you can then configure a policy that grants access to this resource. You can use roles as part
of this policy, but you can refine it by using other criteria such as LDAP attributes, credential profile
attributes, or the day of the week.
The J2EE Agent also allows you to decide how you want the authorization to be handled. You can
use the security settings configured on the application server, use the Authorization policies
configured on the J2EE Agent, or use both methods.
The following sections explain how to set up security for your J2EE resources:

6.1 Configuring Access Control

The access control configuration determines which Authorization policies are used to allow access
to resources. The application server must be configured to allow the J2EE Agent to enforce
authorization:
After you have configured the J2EE server for authorization, you need to configure the J2EE Agent
for access control:
2 In the Access Control Configuration section, select one or more of the following:
Enforce application server policy: Allows access based on the policy of the application
server. These policies are defined on the application server in a
in a
file for a
ejb-jar.xml
IMPORTANT: If you select this option and you are using a JBoss server, see
"Configuring Security Constraints," on page 70
file.
.jar
for additional information.
file for a
file and
web.xml
.war
Section 4.2.2,
6
89

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ACCESS MANAGER 3.1 SP2 - J2EE AGENT GUIDE 2010 and is the answer not in the manual?

This manual is also suitable for:

Access manager 3.1 sp 2

Table of Contents