Book Image

IBM WebSphere Application Server v7.0 Security

By : Omar P Siliceo (USD)
Book Image

IBM WebSphere Application Server v7.0 Security

By: Omar P Siliceo (USD)

Overview of this book

In these days of high-profile hacking, server security is no less important than securing your application or network. In addition many companies must comply with government security regulations. No matter how secure your application is, your business is still at risk if your server is vulnerable. Here is how you solve your WebSphere server security worries in the best possible way. This tutorial is focused towards ways in which you can avoid security loop holes. You will learn to solve issues that can cause bother when getting started with securing your IBM WebSphere Application Server v7.0 installation. Moreover, the author has documented details in an easy-to-read format, by providing engaging hands-on exercises and mini-projects. The book starts with an in-depth analysis of the global and administrative security features of WebSphere Application Server v7.0, followed by comprehensive coverage of user registries for user authentication and authorization information. Moving on you will build on the concepts introduced and get hands-on with a mini project. From the next chapter you work with the different front-end architectures of WAS along with the Secure Socket Layer protocol, which offer transport layer security through data encryption. You learn user authentication and data encryption, which demonstrate how a clear text channel can be made safer by using SSL transport to encrypt its data. The book will show you how to enable an enterprise application hosted in a WebSphere Application Server environment to interact with other applications, resources, and services available in a corporate infrastructure. Platform hardening, tuning parameters for tightening security, and troubleshooting are some of the aspects of WebSphere Application Server v7.0 security that are explored in the book. Every chapter builds strong security foundations, by demonstrating concepts and practicing them through the use of dynamic, web-based mini-projects.
Table of Contents (17 chapters)
IBM WebSphere Application Server v7.0 Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface

Chapter 9. WebSphere Default Installation Hardening

There is a class of products that when we purchase them they need to be changed in order for them to be useful to us. Consider for an instance that I was travelling to Las Vegas, NV and decided to buy a watch. (Why would I be buying watches in Las Vegas? Well, it beats me; but that is a different story.) It is very likely that I may need to change the time, and perhaps time zone (for some sophisticated watches) to match the time where I live. This change was necessary to make the product useful to me. We also have a class of products that we may want to change to increase their security. Take for instance a GPS. Many of the recent models allow the owner to define a PIN that must be entered for the user to start the device. So only those persons that know the PIN would be able to use it; perhaps deterring thieves from stealing it; or if they do, so they cannot use it or resell it easily. In any event, a watch or a GPS are examples of very...