Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying IBM WebSphere Application Server v7.0 Security
  • Table Of Contents Toc
IBM WebSphere Application Server v7.0 Security

IBM WebSphere Application Server v7.0 Security

By : Omar P Siliceo (USD)
3 (2)
close
close
IBM WebSphere Application Server v7.0 Security

IBM WebSphere Application Server v7.0 Security

3 (2)
By: Omar P Siliceo (USD)

Overview of this book

In these days of high-profile hacking, server security is no less important than securing your application or network. In addition many companies must comply with government security regulations. No matter how secure your application is, your business is still at risk if your server is vulnerable. Here is how you solve your WebSphere server security worries in the best possible way. This tutorial is focused towards ways in which you can avoid security loop holes. You will learn to solve issues that can cause bother when getting started with securing your IBM WebSphere Application Server v7.0 installation. Moreover, the author has documented details in an easy-to-read format, by providing engaging hands-on exercises and mini-projects. The book starts with an in-depth analysis of the global and administrative security features of WebSphere Application Server v7.0, followed by comprehensive coverage of user registries for user authentication and authorization information. Moving on you will build on the concepts introduced and get hands-on with a mini project. From the next chapter you work with the different front-end architectures of WAS along with the Secure Socket Layer protocol, which offer transport layer security through data encryption. You learn user authentication and data encryption, which demonstrate how a clear text channel can be made safer by using SSL transport to encrypt its data. The book will show you how to enable an enterprise application hosted in a WebSphere Application Server environment to interact with other applications, resources, and services available in a corporate infrastructure. Platform hardening, tuning parameters for tightening security, and troubleshooting are some of the aspects of WebSphere Application Server v7.0 security that are explored in the book. Every chapter builds strong security foundations, by demonstrating concepts and practicing them through the use of dynamic, web-based mini-projects.
Table of Contents (17 chapters)
close
close
IBM WebSphere Application Server v7.0 Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface

Identifying where to focus


It would be practically impossible for a vendor to create an OS/hardware configuration that would securely and efficiently cover all customers' needs. When at IBM, I heard co-workers sometimes exclaim how creative our customers were when it came to finding ways to either use or configure one of our products that we had not thought about. It is probably the same when in your organization systems are configured to better cope with a specific job, that job being a database server or a J2EE application server or what have you.

One of the keys to unlock the art of hardening the default installation of your underlying OS is to identify borders between the WAS ND7 environment and the OS/hardware. Finding such borders will make the task a little easier since it will help to narrow the scope of what needs to be analyzed.

The previous diagram, in a very abstract fashion, depicts the salient borders between a WAS instance and the basic systems within the OS. So, let's take...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
IBM WebSphere Application Server v7.0 Security
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon