- Default Security Settings: Some of the default settings have been changed in the new version:
- Administrative security is enabled automatically during installation.
- All internal transports are authenticated by default.
- Most internal transports are encrypted by default.
- The default encryption keys are eliminated. A cell-specific set of keys is created automatically.
- JNDI is read-only by default to all.
- Messaging limits connections to only authenticated users granted the bus connect role by default. AllAuthenticated no longer has that role by default.
- Simplified certificate and key management.
- The admin client can query the server and automatically import the server's signing certificate
- The admin tools can be used to generate certificates and certificate requests, import keys and certificates, manage certificates and keys, and even share them across the cell.
- Programmatic APIs for applications to obtain URLStreamHandlers, SSLContext instances, and SSLSocketFactories, based on the WebSphere Application Server-managed SSL configuration.
- LTPA encryption keys are automatically changed at regular intervals. To avoid outages, multiple key versions are simultaneously supported.
- Support for federated repositories.
- Support for file registry
- Support for multiple LDAP registries.
- Support for LDAP failover.
- Fine-grained authorization control (below cell level) for administrative users.
- Single Sign-On from windows desktops to intranet applications.
Monday, June 12, 2006
Security Enhancements in WebSphere 6.1
In his latest article, Keys Botzum gives an overview of the the security enhancements to WebSphere Application Server 6.1. Here is a a list of the enhancements, for more details, read the article.
Subscribe to:
Post Comments (Atom)
Popular Posts
-
In a previous post, I described how to use Quartz scheduler for scheduling . In this post, I describe the configuration changes required for...
-
The previous post described how to implement a JMS messaging client using Spring JMS . This post will describe how to implement the Message ...
-
This post will describe how to create and deploy a Java Web Application war to Heroku using Heroku CLI. You will need a basic understanding ...
-
JUnit 4 introduces a completely different API to the older versions. JUnit 4 uses Java 5 annotations to describe tests instead of using in...
-
New posts with iText 5.5.12 Following are two new posts for PDF Merge with iText 5.5.12 Merge PDF files using iText 5 Merge and Paginate PDF...
-
Roller is a Java based blog server. It is in Apache incubator as of now. Roller drives Sun Microsystem's blogs.sun.com employee bloggi...
-
In the previous post, I described the use of Displaytag to implement paging in a simple JSP. In this example, I describe the use of Displayt...
-
In the past, I wrote a post on how to implement Web Services using JAX-WS on Glassfish, and Apache Axis. In this post I will describe how to...
-
Update: A new post for validation in struts with annotation is available at: Struts 2 Validation: Annotations . Struts 2.0 relies on a val...
-
Redhat Enterprise Linux provides Redhat Developer Toolset , which allows you to install Git. However, it is usually an older version. If you...
I have 2 WAS 6.1 servers in 2 boxes and am trying to communicate with EJB's on downstream server by using the JNDI name look up over RMI/IIOP with machine name and port num.
ReplyDeleteIt is giving me org.omg.CORBA.NO_PERMISSION: Authentication failed. Could not validate Client Authentication Token and/or Client Certificates during Identity Assertion vmcid: 0x49424000 minor code: 30D completed: No
I have enabled global security and application security,and am using CSIV2 outbound[upstream server], CSIV2 inbound [downstream server].
Is there any thing i have to take care.
Any help appriciated.