IBM WebSphere Application Server v7.0 Security

For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overview to the fundamentals of data encryption, all the essentials are here.

IBM WebSphere Application Server v7.0 Security

Starting
Omar Siliceo

For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overview to the fundamentals of data encryption, all the essentials are here.
$32.99
$54.99
RRP $32.99
RRP $54.99
eBook
Print + eBook
$12.99 p/month

Want this title & more? Subscribe to PacktLib

Enjoy full and instant access to over 2000 books and videos – you’ll find everything you need to stay ahead of the curve and make sure you can always get the job done.
+ Collection
Free sample

Book Details

ISBN 139781849681483
Paperback312 pages

About This Book

  • Discover the salient and new security features offered by WebSphere Application Server version 7.0 to create secure installations
  • Explore and learn how to secure Application Servers, Java Applications, and EJB Applications along with setting up user authentication and authorization
  • With the help of extensive hands-on exercises and mini-projects, explore the various aspects needed to produce secure IBM WebSphere Application Server Network Deployment v7.0 infrastructures
  • A practical reference with ready-to-implement best practices and tricks for configuring, hardening, tuning, and troubleshooting secure IBM WebSphere Application Server Network Deployment v7.0 environments

Who This Book Is For

If you are a system administrator or an IT professional who wants to learn about the security side of the IBM WebSphere Application Server v7.0, this book will walk you through the key aspects of security and show you how to implement them. You do not need any previous experience in WebSphere Application Server, but some understanding of Java EE technologies will be helpful. In addition, Java EE application developers and architects who want to understand how the security of a WebSphere environment affects Java EE enterprise applications will find this book useful.

Table of Contents

Chapter 1: A Threefold View of WebSphere Application Server Security
Enterprise Application-server infrastructure architecture view
WebSphere architecture view
WebSphere technology stack view
Summary
Chapter 2: Securing the Administrative Interface
Information needed: Planning for security
Enabling security
Administrative roles
Disabling security
Summary
Chapter 3: Configuring User Authentication and Access
Security domains
Administrative security domain
User registry concepts
Supported user registry types
Protecting application servers
Summary
Chapter 4: Front-End Communication Security
Front-end enterprise application infrastructure architectures
SSL configuration and management
Securing front-end components communication
Summary
Chapter 5: Securing Web Applications
Securing web applications concepts
Securing a web application
Summary
Chapter 6: Securing Enterprise Java Beans Applications
EJB application security concepts
EJB project design
EJB project prerequisites and assumptions
Creating an Enterprise Application Project
Creating the portal Dynamic Web Project
Creating content for the portal DWP
Creating an EJB project
The grand finale
Summary
Chapter 7: Securing Back-end Communication
LDAP: Uses of encryption
JDBC: WebSphere-managed authentication
Summary
Chapter 8: Secure Enterprise Infrastructure Architectures
The enterprise infrastructure
Securing the enterprise infrastructure using LTPA
Securely enhancing the user experience with SSO
Fine-tuning authorization at the HTTP server level
Fine-tuning authorization at the WAS level
Summary
Chapter 9: WebSphere Default Installation Hardening
Engineering the how and where of an installation
Ensuring good housekeeping of an installation
Summary
Chapter 10: Platform Hardening
Identifying where to focus
Exploring the operating system
Creating the file system
Safeguarding the network system
Summary
Chapter 11: Security Tuning and Troubleshooting
Tuning WebSphere security
Troubleshooting WebSphere security-related issues
Concluding WebSphere security-related tips
Summary

What You Will Learn

  • Create security domains using the wsadmin scripting tool
  • Get hands-on experience working with a mini-project to protect a Java EE Application Server
  • Secure your frontend with Secure Socket Layer Protocol and IBM HTTP Server
  • Get to grips with user authentication and authorization by building a multi-module Enterprise Web Application; packaging, deploying, and testing it
  • Work around to secure an EJB application by building on the existing mini-project
  • Configure authentication and resource access (authorization) using user registry groups and application-defined roles
  • Configure WebSphere Application Server v7.0 for SSO and LTPA and work across remote servers
  • Explore the powerful concepts of data encryption and SSL certificates practically
  • Practice platform hardening with respect to the Operating System, File System, and network configuration

In Detail

In these days of high-profile hacking, server security is no less important than securing your application or network. In addition many companies must comply with government security regulations. No matter how secure your application is, your business is still at risk if your server is vulnerable. Here is how you solve your WebSphere server security worries in the best possible way.

This tutorial is focused towards ways in which you can avoid security loop holes. You will learn to solve issues that can cause bother when getting started with securing your IBM WebSphere Application Server v7.0 installation. Moreover, the author has documented details in an easy-to-read format, by providing engaging hands-on exercises and mini-projects.

The book starts with an in-depth analysis of the global and administrative security features of WebSphere Application Server v7.0, followed by comprehensive coverage of user registries for user authentication and authorization information. Moving on you will build on the concepts introduced and get hands-on with a mini project. From the next chapter you work with the different front-end architectures of WAS along with the Secure Socket Layer protocol, which offer transport layer security through data encryption.

You learn user authentication and data encryption, which demonstrate how a clear text channel can be made safer by using SSL transport to encrypt its data. The book will show you how to enable an enterprise application hosted in a WebSphere Application Server environment to interact with other applications, resources, and services available in a corporate infrastructure. Platform hardening, tuning parameters for tightening security, and troubleshooting are some of the aspects of WebSphere Application Server v7.0 security that are explored in the book. Every chapter builds strong security foundations, by demonstrating concepts and practicing them through the use of dynamic, web-based mini-projects.

Authors

Table of Contents

Chapter 1: A Threefold View of WebSphere Application Server Security
Enterprise Application-server infrastructure architecture view
WebSphere architecture view
WebSphere technology stack view
Summary
Chapter 2: Securing the Administrative Interface
Information needed: Planning for security
Enabling security
Administrative roles
Disabling security
Summary
Chapter 3: Configuring User Authentication and Access
Security domains
Administrative security domain
User registry concepts
Supported user registry types
Protecting application servers
Summary
Chapter 4: Front-End Communication Security
Front-end enterprise application infrastructure architectures
SSL configuration and management
Securing front-end components communication
Summary
Chapter 5: Securing Web Applications
Securing web applications concepts
Securing a web application
Summary
Chapter 6: Securing Enterprise Java Beans Applications
EJB application security concepts
EJB project design
EJB project prerequisites and assumptions
Creating an Enterprise Application Project
Creating the portal Dynamic Web Project
Creating content for the portal DWP
Creating an EJB project
The grand finale
Summary
Chapter 7: Securing Back-end Communication
LDAP: Uses of encryption
JDBC: WebSphere-managed authentication
Summary
Chapter 8: Secure Enterprise Infrastructure Architectures
The enterprise infrastructure
Securing the enterprise infrastructure using LTPA
Securely enhancing the user experience with SSO
Fine-tuning authorization at the HTTP server level
Fine-tuning authorization at the WAS level
Summary
Chapter 9: WebSphere Default Installation Hardening
Engineering the how and where of an installation
Ensuring good housekeeping of an installation
Summary
Chapter 10: Platform Hardening
Identifying where to focus
Exploring the operating system
Creating the file system
Safeguarding the network system
Summary
Chapter 11: Security Tuning and Troubleshooting
Tuning WebSphere security
Troubleshooting WebSphere security-related issues
Concluding WebSphere security-related tips
Summary

Book Details

ISBN 139781849681483
Paperback312 pages
Read More

Recommended for You