Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Serwery Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS. Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS User guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 328
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Security System Guide

Interstage Application Server V7.0 Security System Guide

Strona 2 - Trademarks

Security System Guide: Table of Contents x Security Measures for Operation of the Web Server (Interstage HTTP Server)...2-4

Strona 3 - Preface

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-4 Online Collation This function is used to control and store the user

Strona 4

Setting the User Authentication 3-5 Setting the User Authentication User authentication is set according to the following procedures. 1. Registering

Strona 5

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-6 Editing the Environment Definition File To allow the users whose pass

Strona 6

Setting the User Authentication 3-7 Relating Directives • AuthName • AuthType • AuthUserFile • <Directory> • Require Relating Directives When u

Strona 7 - Table of Contents

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-8 AuthName Name AuthName Synopsis AuthName 'title' Descripti

Strona 8

Setting the User Authentication 3-9 AuthUserFile Name AuthUserFile Synopsis AuthUserFile file-name Description Specifies the name of the password fil

Strona 9

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-10 Require Name Require Synopsis Require valid-user|user user-name|gro

Strona 10

Setting the IP Access Control 3-11 Setting the IP Access Control For IP access control, you can allow only specified hosts to make access to directori

Strona 11

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-12 Relating Directives When IP access control is used, the following di

Strona 12

Setting the IP Access Control 3-13 Description Specifies a host or network that is granted access to the directories. Specifying 'all' for t

Strona 13

Security System Guide - Table of Contents xi Security Measures for Portable-ORB ...

Strona 14

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-14 <Directory> Name <Directory> Synopsis <Directory dire

Strona 15

Setting the Online Collation Function 3-15 Setting the Online Collation Function Set the operation of the online collation function according to the f

Strona 16

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-16 Operation without Using SSL Configuration Procedure 1 This section e

Strona 17

Setting the Online Collation Function 3-17 Configuration Procedure 3 (when Interstage HTTP Server and Smart Repository are on different systems) The f

Strona 18

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-18 Setting the Directory Server Environment To use the online collation

Strona 19

Setting the Online Collation Function 3-19 Example of User Entry Configuration Figure 3-4 Creating User Entry Creating Group Entry Create the group

Strona 20

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-20 Example of Group Entry Figure 3-5 Group Entry Configuration Set th

Strona 21 - Security Risks and Measures

Setting the Online Collation Function 3-21 Setting 1: Operation without Using SSL Example Running the online collation function without using SSL, u

Strona 22

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-22 Example Running the online collation function without using SSL,

Strona 23 - Security Risks

Setting the Online Collation Function 3-23 Setting 2: Operation Using the SSL (setting for using an Interstage certificate environment or for using SS

Strona 24 - Operation Tool

Security System Guide: Table of Contents xii Relating Directives...

Strona 25 - Resource Possible threat

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-24 Example Running the online collation function without using SSL,

Strona 26

Setting the Online Collation Function 3-25 Setting 3: Operation Using the SSL (setting for using a certificate/key management environment configured w

Strona 27 - J2EE Application

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-26 # Token label AuthLDAPTknLbl token01 # User PIN file

Strona 28 - Resources to be Protected

Setting the Online Collation Function 3-27 # (389:optional value for not using SSL, 636:optional value for using SSL) AuthLDAPPort 636

Strona 29 - Possible Security Risks

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-28 • <Directory> • Group • LoadModule • Require • User Relating D

Strona 30

Setting the Online Collation Function 3-29 Module Name of the module that implements the directive function. A directive with no module name indicati

Strona 31 - Possible Countermeasures

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-30 Description Specifies the name of the tree that is storing informati

Strona 32

Setting the Online Collation Function 3-31 AuthLDAPBindPassword Name AuthLDAPBindPassword Synopsis AuthLDAPBindPassword BindPassword Description When

Strona 33 - Web Services

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-32 Module mod_ldap AuthLDAPEnabled Name AuthLDAPEnabled Synopsis AuthL

Strona 34 - Database Linkage Service

Setting the Online Collation Function 3-33 Default Value localhost Module mod_ldap AuthLDAPPort Name AuthLDAPPort Synopsis AuthLDAPPort Port-number

Strona 35

Security System Guide - Table of Contents xiii ServerRoot...

Strona 36

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-34 Description Specifies whether to use SSL for the operation of the on

Strona 37

Setting the Online Collation Function 3-35 AuthLDAPTknLbl Name AuthLDAPTknLbl Synopsis AuthLDAPTknLbl token-label Description Specifies the token lab

Strona 38

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-36 AuthName Name AuthName Synopsis AuthName 'title' Descript

Strona 39

Setting the Online Collation Function 3-37 <Directory> Name <Directory> Synopsis <Directory directory-path> ... </Directory> D

Strona 40 - Periodic Backup

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-38 Default Value None #-1 Note Group ID operates as 4294967295 when

Strona 41 - OLTP Function

Setting the Online Collation Function 3-39 Module mod_so Require Name Require Synopsis Require valid-user|user user-name|group group-name Descriptio

Strona 42

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-40 Examples To authenticate a user 'taro': Require user ta

Strona 43

Setting the Online Collation Function 3-41 User Name User Synopsis User userID Description Specifies the name of the user who executes the server

Strona 44

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-42

Strona 45

Part III Firewall and Proxy Server

Strona 46 - Smart Repository

Security System Guide: Table of Contents xiv Registering the CA Certificate...

Strona 48 - Operation by Limited Users

4-1 Chapter 4 HTTP Tunneling This chapter describes HTTP Tunneling. Note HTTP tunneling can be used with the following products running in the Wind

Strona 49 - Periodic Data Backup

Chapter 4: HTTP Tunneling 4-2 HTTP Data Communication Using HTTP Tunneling In HTTP tunneling, data communication using the HTTP protocol can be condu

Strona 50 - Interstage Single Sign-on

HTTP Data Communication Using HTTP Tunneling 4-3 Developing the CORBA Application When HTTP tunneling is used by a CORBA application, the ordinary COR

Strona 51 - Possible Threats

Chapter 4: HTTP Tunneling 4-4 HTTP Tunneling Setup This section describes the procedure for setting the environment when using the HTTP tunneling in

Strona 52 - Security Measures

HTTP Tunneling Setup 4-5 (1) Using Interstage HTTP Server Copy the following file (the installation path is the default) to the modules directory of

Strona 53

Chapter 4: HTTP Tunneling 4-6 Notes • When the Web server is Interstage HTTP Server, messages od40001 and od40002 are not output. (2) Using InfoP

Strona 54

HTTP Tunneling Setup 4-7 For IIS 6.0: 1. Select [Control Panel] > [Administrative Tools] > [Internet Information Services (IIS) Manager] to sta

Strona 55 - Application Programming

Chapter 4: HTTP Tunneling 4-8 <applet code=”Sample.class” width=280 height=300> <param name=ORB_FJ_HTTP value=yes> <pa

Strona 56 - Applying Patches

HTTP Tunneling Setup 4-9 Parameter Name Meaning Specify the cgi ID if Web Server is used. If using Internet Information Services, specify the alia

Strona 57 - Multi Server Management

Security System Guide - Table of Contents xv Registering the User PIN...

Strona 58 - Configuration Model

Chapter 4: HTTP Tunneling 4-10 Application Other than the Java Applet Specify the parameter in the following way when a client application (sample_c)

Strona 59

HTTP Tunneling Setup 4-11 <applet code="Sample.class" width=300 height=250> <PARAM NAME=ORB_FJ_HTTP VALUE=yes> <PARAM NAME=

Strona 60

Chapter 4: HTTP Tunneling 4-12 <PARAM NAME=ORB_FJ_SSL VALUE=yes> <PARAM NAME=ORB_FJ_HTTPGW VALUE=http://host.com/od-httpgw> </applet&g

Strona 61 - Threat Prevention

HTTP Tunneling Setup 4-13 Setting to be Made When an HTTP Proxy Server is to be Used When performing HTTP tunneling through an HTTP proxy server in th

Strona 62

Chapter 4: HTTP Tunneling 4-14

Strona 63

5-1 Chapter 5 HTTP Tunneling of J2EE This chapter describes the HTTP Tunneling of J2EE. HTTP tunneling for J2EE can be used with the following: •

Strona 64

Chapter 5: HTTP Tunneling of J2EE 5-2 Use of HTTP Tunneling in J2EE Application Client To use HTTP tunneling with a J2EE application client, specify

Strona 65

Use of HTTP Tunneling in J2EE Application Client 5-3 The environment property in which the gateway is specified is shown in Table 5-1. Table 5-1 Envi

Strona 66 - Chapter 1: Security Risks

Chapter 5: HTTP Tunneling of J2EE 5-4 (1) For Interstage HTTP Server http://ipv4address_host-name/url-name http://ipv4address_host-name:Port_numb

Strona 67 - Chapter 2

Method for Using HTTP Tunneling with IJServer (Contains Web Applications Only) 5-5 Method for Using HTTP Tunneling with IJServer (Contains Web Applica

Strona 68 - Common Security Measures

Security System Guide: Table of Contents xvi Setting the SSL Information in the CORBA Application (Server Application Only)...10-4 Ope

Strona 69 - Notes on Communication Data

Chapter 5: HTTP Tunneling of J2EE 5-6 Method for Using HTTP Tunneling with Java Applets When Java applets start, HTTP tunneling is specified with par

Strona 70 - (Interstage HTTP Server)

6-1 Chapter 6 Linkage of the Proxy This chapter describes the linkage of the Proxy.

Strona 71

Chapter 6: Linkage of the Proxy 6-2 Linkage of the Proxy and SOAP Service SOAP service can be used with the following products: • Interstage Applica

Strona 72

Part IV Authentication and Encrypted Communications through Support for SSL This part of the manual explains how to perform encryption communication

Strona 73

Table 7-1 shows which service can support which environment. Table 7-1 Services and Environments Service name Interstage certificate environment Cer

Strona 74

7-1 Chapter 7 Setting and Use of the Interstage Certificate Environment This chapter explains what is required for signature and encryption processi

Strona 75 - (InfoProvider Pro)

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-2 Certificates and Private Keys This section explains certificates and private

Strona 76 - Notes on the Use of Sessions

Certificates and Private Keys 7-3 Table 7-2 shows the situations in which certificates including UTF-8 cannot be used. If a certificate including UTF

Strona 77

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-4 CA (Certification Authority) The CA (Certification Authority) is required to

Strona 78

Configuring Environments 7-5 Configuring Environments The Interstage Certificate Environment is an environment in which certificates, private keys, an

Strona 79

Security System Guide - Table of Contents xvii Constructing a Key Pair/Certificate Management Environment...

Strona 80 - SSL Encryption

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-6 Using PKCS#12 Data Use PKCS#12 data when a private Certification Authority i

Strona 81

Configuring Environments 7-7 Note • Execute the commands as a superuser. • For effective users to be registered in the Interstage certificate enviro

Strona 82 - Definition

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-8 Configuring the Interstage Certificate Environment with CSR This section des

Strona 83

Configuring the Interstage Certificate Environment with CSR 7-9 Configuring an Interstage Certificate Environment and Creating a Certificate Signing R

Strona 84

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-10 The services listed below are concerned: − Interstage SOAP Service − Smar

Strona 85

Configuring the Interstage Certificate Environment with CSR 7-11 Registering the CA Certificate Register the obtained CA certificate. An example of re

Strona 86

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-12 Registering the Certificate of Another Reliable Site Register the certifica

Strona 87 - About Errors and Exceptions

Configuring the Interstage Certificate Environment with PKCS#12 7-13 Configuring the Interstage Certificate Environment with PKCS#12 This section desc

Strona 88

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-14 Registering PKCS#12 Data, Certificates, and CRLs Register the PKCS#12 data,

Strona 89 - Notes on IJServer Execution

Configuring the Interstage Certificate Environment with PKCS#12 7-15 Importing the PKCS#12 data Import the site certificate and private key delivered

Strona 90 - Repository

Security System Guide: Table of Contents xviii Chapter 16 How to Use Reliable Messaging Function for Web Services (SOAP) PUSH Model (Receiving Mess

Strona 91

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-16 Registering a CRL Register the obtained CRL. An example of registration is

Strona 92 - Security Role Settings

Configuring Certificate Settings 7-17 Configuring Certificate Settings After configuring the Interstage certificate environment, you need to make the

Strona 93

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-18 • CORBA Service [System] > [Environment setup] tab > [Detail setting]

Strona 94

Certificate Management 7-19 Certificate Management After system operation begins, certificates, private keys, and CRLs must be correctly managed. The

Strona 95 - Part II

Chapter 7: Setting and Use of the Interstage Certificate Environment 7-20 If a New Certificate and CRL are Obtained If a new certificate is issued or

Strona 96

8-1 Chapter 8 Setting and Use of the Certificate/Key Management Environment Using the SMEE Command This chapter describes the requirements for SSL c

Strona 97 - Interstage HTTP Server

Chapter 8: Setting and Use of the Certificate/Key Management Environment Using the SMEE Command 8-2 SSL Libraries Used with the Certificate/Key Manag

Strona 98 - Types of Authentication

SSL Libraries Used with the Certificate/Key Management Environment 8-3 SSL Library SMEE2 SMEE3 CORBA Service X O Certificate/Key Management Env

Strona 99 - IP Access Control

Chapter 8: Setting and Use of the Certificate/Key Management Environment Using the SMEE Command 8-4 In addition, you can import PKCS#12 data exported

Strona 100 - Online Collation

SSL Libraries Used with the Certificate/Key Management Environment 8-5 Figure 8-2 Relationship between Slot, Token and Private Key The slot password

Strona 101 - Registering a User Password

Security System Guide - Table of Contents xix Appendix B Authentication and Access Control for the Component Transaction Service User Authentication

Strona 102

Chapter 8: Setting and Use of the Certificate/Key Management Environment Using the SMEE Command 8-6 3. Register the certificate and CRL. − Register

Strona 103 - Relating Directives

SSL Libraries Used with the Certificate/Key Management Environment 8-7 Creating a Certificate/Key Management Environment Create a certificate/key mana

Strona 104 - AuthType

Chapter 8: Setting and Use of the Certificate/Key Management Environment Using the SMEE Command 8-8 mkslt -sd d:\sslenv\slot #Generation and init

Strona 105 - <Directory>

SSL Libraries Used with the Certificate/Key Management Environment 8-9 Creating a Private Key and Acquiring a Certificate Make a request to issue a ce

Strona 106 - Require

Chapter 8: Setting and Use of the Certificate/Key Management Environment Using the SMEE Command 8-10 Registering the Certificate and CRL Register the

Strona 107

SSL Libraries Used with the Certificate/Key Management Environment 8-11 The example below assumes the site certificate is contained in /export/hom

Strona 108

Chapter 8: Setting and Use of the Certificate/Key Management Environment Using the SMEE Command 8-12 Obtaining the Client Certificate To obtain a cli

Strona 109

SSL Libraries Used with the Certificate/Key Management Environment 8-13 The following shows the procedure for migration: 1. Search for existing resou

Strona 110

Chapter 8: Setting and Use of the Certificate/Key Management Environment Using the SMEE Command 8-14 The example below assumes the newly created Cer

Strona 111

SSL Libraries Used with the Certificate/Key Management Environment 8-15 Management of a Certificate/Key Management Environment Because each user certi

Strona 112 - Operation Using SSL

Security System Guide - Preface ii Trademarks Trademarks of other companies are used in this user guide only to identify particular products or system

Strona 113

Security System Guide: Table of Contents xx

Strona 114 - Creating Entries

Chapter 8: Setting and Use of the Certificate/Key Management Environment Using the SMEE Command 8-16

Strona 115 - Item Description

9-1 Chapter 9 How to Use SSL with Interstage HTTP Server This chapter explains how to use the SSL for the Interstage HTTP Server. The Interstage HTT

Strona 116

Chapter 9: How to Use SSL with Interstage HTTP Server 9-2 Setting SSL for Interstage Certificate Environments To use SSL for an Interstage certificat

Strona 117

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-3 Setting SSL for Certificate/Key Management Environments

Strona 118

Chapter 9: How to Use SSL with Interstage HTTP Server 9-4 Example When the user PIN (dialog input) is encrypted and registered to the user PIN mana

Strona 119

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-5 ServerName main.example.com # Using SSL SSLExec on # SS

Strona 120

Chapter 9: How to Use SSL with Interstage HTTP Server 9-6 # Server name ServerName main.example.com # User of creating a certificate/key management

Strona 121

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-7 # Slot information directory SSLSlotDir d:/ssl/slotdir

Strona 122

Chapter 9: How to Use SSL with Interstage HTTP Server 9-8 SSLVersion 2-3 # Level of client certification SSLVerifyClient require # Operation

Strona 123

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-9 # # Virtual host not using SSL (Port number: 80) # # Se

Strona 124

Part I Security Risks and Measures If the system security is violated, unauthorized access by malicious attackers can cause interference and unautho

Strona 125 - AuthLDAPbasedn

Chapter 9: How to Use SSL with Interstage HTTP Server 9-10 # Nickname of the site certificate SSLCertName cert_for_manager # Nickname of the cl

Strona 126 - AuthLDAPBindDN

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-11 Relating Directives The following directives are relat

Strona 127 - AuthLDAPCertPath

Chapter 9: How to Use SSL with Interstage HTTP Server 9-12 AddModule Name AddModule Synopsis AddModule module [module] ... Description Enables read m

Strona 128 - AuthLDAPHost

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-13 CustomLog Name CustomLog Synopsis CustomLog “|ihsrlog-c

Strona 129 - AuthLDAPSecure

Chapter 9: How to Use SSL with Interstage HTTP Server 9-14 Initial value CustomLog "|ihsrlog -s logs/accesslog 1 5" common Cu

Strona 130 - AuthLDAPSlotPath

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-15 Example Accesses "/usr/web/index.html" when s

Strona 131 - AuthLDAPTknPwd

Chapter 9: How to Use SSL with Interstage HTTP Server 9-16 ErrorLog "|/opt/FJSVihs/bin/ihsrlog -s /var/opt/FJSVihs/logs/errorlog 1 5"

Strona 132

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-17 Listen Name Listen Synopsis Listen [IP-address:]port D

Strona 133

Chapter 9: How to Use SSL with Interstage HTTP Server 9-18 %l Personal information of a user returned from a client %{Cookie}n Client IP address and

Strona 134 - LoadModule

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-19 Port Name Port Synopsis Port port-number Description T

Strona 136 - ServerRoot

Chapter 9: How to Use SSL with Interstage HTTP Server 9-20 Initial value ScriptAlias /cgi-bin/ "C:/Interstage/F3FMihs/cgi-bin/"

Strona 137

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-21 Context Global context, Virtual host Default value none

Strona 138

Chapter 9: How to Use SSL with Interstage HTTP Server 9-22 SetEnvIf Name SetEnvIf Synopsis SetEnvIf attribute attribute-value environment-variable[

Strona 139 - Firewall and Proxy Server

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-23 Synopsis SSLCertName nickname Description Specifies the

Strona 140

Chapter 9: How to Use SSL with Interstage HTTP Server 9-24 SSLCipherSuite Name SSLCipherSuite Synopsis SSLCipherSuite encryption-method Description

Strona 141 - HTTP Tunneling

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-25 Point The encryption types shown in the encryption meth

Strona 142 - HTTP Tunneling Mechanism

Chapter 9: How to Use SSL with Interstage HTTP Server 9-26 SSLEnvDir Name SSLEnvDir Synopsis SSLEnvDir operation-control-directory-name Description S

Strona 143 - Operating HTTP Tunneling

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-27 Default value off Module mod_ihs_ssl SSLSlotDir Name SS

Strona 144 - HTTP Tunneling Setup

Chapter 9: How to Use SSL with Interstage HTTP Server 9-28 Context Global context Default value none Module mod_ihs_ssl SSLUserPINFile Name SSLUserPI

Strona 145

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-29 SSLVerifyClient Name SSLVerifyClient Synopsis SSLVerify

Strona 146

1-1 Chapter 1 Security Risks This chapter explains the resources to be protected (protection target resources), possible threats to the protection t

Strona 147 - Writing HTML

Chapter 9: How to Use SSL with Interstage HTTP Server 9-30 SSLVersion Name SSLVersion Synopsis SSLVersion [2|3|2-3] Description Specifies the version

Strona 148 - Setting up HTTP Tunneling

Setting SSL for Certificate/Key Management Environments Configured with the SMEE Commands 9-31 User Name User Synopsis User userID Description Spe

Strona 149 - Parameter Name Meaning

Chapter 9: How to Use SSL with Interstage HTTP Server 9-32 <VirtualHost> Name <VirtualHost> Synopsis <VirtualHost> address[:port]&

Strona 150 - Java Applets

10-1 Chapter 10 How to Use SSL with the CORBA Service Client-server application linkage using the CORBA Service enables encrypted communication via

Strona 151

Chapter 10: How to Use SSL with the CORBA Service 10-2 Use the following procedure to add executing user access authority to the certificate/key mana

Strona 152

SSL Linkage of the CORBA Service 10-3 SSL Linkage of the CORBA Service The SSL linkage function of the CORBA Service performs encrypted communication

Strona 153

Chapter 10: How to Use SSL with the CORBA Service 10-4 Constructing SSL Linkage Environment To perform encryption communication using SSL, the follow

Strona 154 - Chapter 4: HTTP Tunneling

SSL Linkage of the CORBA Service 10-5 Operating the SSL Linkage The application linkage that uses SSL can be performed by accessing the server applica

Strona 155 - HTTP Tunneling of J2EE

Chapter 10: How to Use SSL with the CORBA Service 10-6 CORBA Server Environment Setup Configure an Interstage certificate environment, or configure a

Strona 156

SSL Environment Setup in Client 10-7 SSL Environment Setup in Client To use an Interstage certificate environment, set an SSL environment using the I

Strona 157 - Meaning

Chapter 1: Security Risks 1-2 Interstage Management Console and Interstage Operation Tool The Interstage Management Console and the Interstage Operat

Strona 158

Chapter 10: How to Use SSL with the CORBA Service 10-8 Example Define a private key/certificate in the CORBA Service. odsetSSL -sd C:\slot -ed C:

Strona 159

Environment Setup for Event Service 10-9 Environment Setup for Event Service The Event Service can be used with the following products: • Interstage

Strona 160

Chapter 10: How to Use SSL with the CORBA Service 10-10 For Dynamic Generation and Operation (for Environment Setting using the Event Service Operati

Strona 161 - Linkage of the Proxy

11-1 Chapter 11 How to Use SSL with J2EE This chapter describes how to use SSL with J2EE.

Strona 162

Chapter 11: How to Use SSL with J2EE 11-2 Environment Setup for Servlet Service This section explains how to operate the Interstage Management Consol

Strona 163 - Authentication and Encrypted

Environment Setting for EJB Service 11-3 Environment Setting for EJB Service When using SSL linkage, use the Interstage Management Console to set encr

Strona 164

Chapter 11: How to Use SSL with J2EE 11-4 Environment Setting for Interstage JMS Interstage JMS can be used with the following products. • Interstag

Strona 165 - Chapter 7

12-1 Chapter 12 Using SSL for Smart Repository Smart Repository supports encrypted communication using SSL. This chapter explains SSL communication

Strona 166

Chapter 12: Using SSL for Smart Repository 12-2 SSL linkage Environment Setup To implement encrypted communication using SSL between a Smart Reposi

Strona 167 - Certificate without

Environment Setup for Using SSL between Smart Repository Client and Server 12-3 Environment Setup for Using SSL between Smart Repository Client and

Strona 168 - CA (Certification Authority)

Interstage Management Console and Interstage Operation Tool 1-3 Possible Security Risks to Resources The following describes possible security threats

Strona 169 - Configuring Environments

Chapter 12: Using SSL for Smart Repository 12-4 Environment Setup for Using SSL between Master and Slave in Smart Repository Replication Operation

Strona 170 - Using PKCS#12 Data

Part V Security Systems for Web Services (SOAP)

Strona 172

13-1 Chapter 13 Security Functions for Web Services (SOAP) Security at the SOAP message level can be ensured by using the digital signature (SOAP di

Strona 173

Chapter 13: Security Functions for Web Services (SOAP) 13-2 Digital Signature Function The digital signature (SOAP digital signature) function is use

Strona 174

Encryption Function of SOAP Messages 13-3 Encryption Function of SOAP Messages The encryption (XML encryption) function is used to encrypt communicati

Strona 175

Chapter 13: Security Functions for Web Services (SOAP) 13-4 Reliable Messaging Function and Non-repudiation Function The reliable messaging function

Strona 176 - Registering a CRL

Attachment Function of the User ID/Password to SOAP Messages 13-5 Attachment Function of the User ID/Password to SOAP Messages The attachment function

Strona 177

Chapter 13: Security Functions for Web Services (SOAP) 13-6 Communication via the Proxy Client applications could exchange SOAP messages with a Web s

Strona 178

14-1 Chapter 14 How to Prepare PKI Environment for Web Services (SOAP) To allow the Web service to use SSL encrypted communication, SOAP digital sig

Strona 179 - Importing the PKCS#12 data

Chapter 1: Security Risks 1-4 Countermeasures Against Exploitation of User IDs and Passwords In an environment open to limited users like an intranet

Strona 180

Chapter 14: How to Prepare PKI Environment for Web Services (SOAP) 14-2 Configuring a Certificate Environment on the Server System This section expla

Strona 181

Configuring a Certificate Environment on the Server System 14-3 Alternatively, from the Interstage Management Console, select [System] > [WorkUnits

Strona 182

Chapter 14: How to Prepare PKI Environment for Web Services (SOAP) 14-4 Relations between Certificate Environment and Application Operation Applicati

Strona 183 - Certificate Management

Configuring an Old Certificate Environment or Client Certificate Environment 14-5 Configuring an Old Certificate Environment or Client Certificate Env

Strona 184 - Deleting a Certificate

Chapter 14: How to Prepare PKI Environment for Web Services (SOAP) 14-6 Table 14-4 Environment Variable Settings Environment variable Description

Strona 185 - Command

Constructing a Key Pair/Certificate Management Environment 14-7 Constructing a Key Pair/Certificate Management Environment If the security function is

Strona 186 - Management Environment

Chapter 14: How to Prepare PKI Environment for Web Services (SOAP) 14-8 In the following cases the creation of a key pair and the acquisition of a si

Strona 187

Constructing a Key Pair/Certificate Management Environment 14-9 Example If SystemWalker/PkiMGR is the certification authority. Example 1. Create a We

Strona 188

Chapter 14: How to Prepare PKI Environment for Web Services (SOAP) 14-10 • Root certificates issued by Japan Certification Services Inc. − SecureSig

Strona 189

Constructing a Key Pair/Certificate Management Environment 14-11 Example Register the site certificate and certification authority certificate with th

Strona 190

J2EE Application 1-5 J2EE Application This section gives an overview of security risks in J2EE applications. Generally, a J2EE application performs op

Strona 191

Chapter 14: How to Prepare PKI Environment for Web Services (SOAP) 14-12 Example 2. Create a Web service security environment information file and

Strona 192

Constructing a Key Pair/Certificate Management Environment 14-13 The following certificates are stored in the certificate management file as the root

Strona 193

Chapter 14: How to Prepare PKI Environment for Web Services (SOAP) 14-14 Registering Site Certificates of the Communication Parties When encrypting m

Strona 194

Using a CORBA/SOAP Gateway 14-15 Using a CORBA/SOAP Gateway If SSL encrypted communication is to be performed in a system environment using a CORBA/SO

Strona 195

Chapter 14: How to Prepare PKI Environment for Web Services (SOAP) 14-16

Strona 196 - Resource Registration

15-1 Chapter 15 User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) This chapter explains how to use user authent

Strona 197

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-2 Setting User Authentication for SOAP Messages

Strona 198

Setting User Authentication for SOAP Messages 15-3 Figure 15-1 Web Service Configuration Edit Tool • Web service identifier Enter the identifier of

Strona 199 - Command Description

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-4 • Request transmission setting: destination

Strona 200

Setting User Authentication for SOAP Messages 15-5 Business Server Environment Setup The server system that implements a Web service to execute user a

Strona 201 - Chapter 9

Chapter 1: Security Risks 1-6 Resources to be Protected The following table lists the resources that are used when the corresponding function availab

Strona 202

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-6 Notes • Without the single sign-on function

Strona 203 - Registering the User PIN

Setting User Authentication for SOAP Messages 15-7 Figure 15-2 Entering User Authentication information

Strona 204 - General Operation of SSL

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-8 • Web service identifier Enter the identifie

Strona 205

Settings for the SOAP Digital Signature 15-9 Settings for the SOAP Digital Signature This section explains the following topics: • Generating a SOAP

Strona 206

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-10 _ap.setContentType("image/jpeg")

Strona 207

Settings for the SOAP Digital Signature 15-11 • Web service identifier Enter the identifier of the Web service. For information on how to specify the

Strona 208

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-12 Notes • If the SOAP digital signature gener

Strona 209

Settings for the SOAP Digital Signature 15-13 Specifying the Signature Target Using XPath Filtering If XPath is specified, nodes for which the result

Strona 210

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-14 Figure 15-4 Web Service Information Edit T

Strona 211

Settings for the SOAP Digital Signature 15-15 • [Client Function]: Response Receiving setup: SOAP signature verification Set whether to verify the SO

Strona 212

J2EE Application 1-7 Function Resource to be protected Execution environment setup for Servlet and EJB IJServer environment definition file Execution

Strona 213 - CustomLog

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-16 Settings for the XML Encryption This section

Strona 214 - DocumentRoot

Settings for the XML Encryption 15-17 Figure 15-5 Settings for Encryption using the XML Encryption • Web service identifier Enter the identifier of

Strona 215 - ErrorLog

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-18 • [Client Function]: Request Sending setup:

Strona 216

Settings for the XML Encryption 15-19 Specifying the Encryption Target The following two types of encryption target can be specified for encryption us

Strona 217 - LogFormat

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-20 • descendant::*[local-name()='ResponseB

Strona 218

Settings for the XML Encryption 15-21 Settings for Decryption Using the XML Encryption The Web Service Information Edit Tool is used to make the setti

Strona 219 - ScriptAlias

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-22 • Web service role (actor) name Specify the

Strona 220 - ServerName

Fault Codes 15-23 Fault Codes In addition to the faults defined in the “Implementing Messaging Applications” and “Implementing RPC Applications” secti

Strona 221

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-24 The following fault code belongs to the name

Strona 222 - SSLCertName

Supported Algorithms 15-25 Supported Algorithms The high-reliability Web service supports the following algorithms. The namespace prefix "wsse&qu

Strona 223 - SSLCICACertName

Security System Guide - Preface iii Preface Purpose of this Document This manual provides information on how to set up and operate a secure Interstage

Strona 224 - SSLCipherSuite

Chapter 1: Security Risks 1-8 Resource to be protected Possible threat IJServer log file Tampering of data recorded in the file Exploitation of inf

Strona 225

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-26 Verifying the SOAP Digital Signature • Diges

Strona 226 - SSLExec

Supported Algorithms 15-27 Items Related to WS-Security • Security token − wsse:BinarySecurityToken − wsse:UsernameToken • Encoding method − wsse:

Strona 227 - SSLTokenLabel

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP) 15-28

Strona 228 - SSLUserPINFile

16-1 Chapter 16 How to Use Reliable Messaging Function for Web Services (SOAP) This chapter explains how to use the Reliable Messaging function with

Strona 229 - SSLVerifyClient

Chapter 16: How to Use Reliable Messaging Function for Web Services (SOAP) 16-2 PUSH Model (Receiving Messages by the Server System) In the PUSH mod

Strona 230 - SSLVersion

PUSH Model (Receiving Messages by the Server System) 16-3 Next, prepare a public key for the sender client. Since the sender client also needs the pu

Strona 231

Chapter 16: How to Use Reliable Messaging Function for Web Services (SOAP) 16-4 Figure 16-1 Reliable Messaging PUSH Screen - Deploying the Receiver

Strona 232 - <VirtualHost>

PUSH Model (Receiving Messages by the Server System) 16-5 • Message type ID Specify the ID that represents the type of message agreed upon with the s

Strona 233 - Chapter 10

Chapter 16: How to Use Reliable Messaging Function for Web Services (SOAP) 16-6 Preparing a Key Pair and Public Key Used by the Sender Client This se

Strona 234

PUSH Model (Receiving Messages by the Server System) 16-7 Figure 16-2 Reliable Messaging PUSH Screen - Deploying the Sender Application dialog • W

Strona 235

J2EE Application 1-9 Possible Countermeasures The following outlines possible countermeasures against security risks. For further details, refer to t

Strona 236

Chapter 16: How to Use Reliable Messaging Function for Web Services (SOAP) 16-8 • Receiver ID (Receiver server ID) Specify the ID of the receiver se

Strona 237 - Operating the SSL Linkage

PULL Model (Receiving Messages by the Client System) 16-9 PULL Model (Receiving Messages by the Client System) In the PULL model, the sender applicat

Strona 238 - Reference

Chapter 16: How to Use Reliable Messaging Function for Web Services (SOAP) 16-10 The following shows an example of command execution to output the pu

Strona 239 - Command Definition

PULL Model (Receiving Messages by the Client System) 16-11 • Web service identifier Identifies the receiver application. For details on how to specif

Strona 240 - Editing config File

Chapter 16: How to Use Reliable Messaging Function for Web Services (SOAP) 16-12 Notes The Sender server ID, Receiver client ID, and message type ID

Strona 241

PULL Model (Receiving Messages by the Client System) 16-13 Figure 16-4 Reliable Messaging PULL Screen - Deploying the Receiver Application dialog •

Strona 242

Chapter 16: How to Use Reliable Messaging Function for Web Services (SOAP) 16-14 • Message type ID Specify the ID that represents the type of messag

Strona 243 - Chapter 11

Part VI Security Systems for the ebXML Message Service The ebXML Message Service can be used with the following Windows(R) system or Solaris OE sy

Strona 245

17-1 Chapter 17 How to use SSL with the ebXML Message Service This chapter explains how to use SSL with the ebXML Message Service. With the ebXML Mes

Strona 246

Chapter 1: Security Risks 1-10 Countermeasures Against Damage to Data There are some J2EE applications that use databases. For this type of applicat

Strona 247 - Chapter 12

Chapter 17: How to use SSL with the ebXML Message Service 17-2

Strona 248

18-1 Chapter 18 How to use XML Digital Signature with ebXML Message Service This chapter explains how to use the XML digital signature with the ebXM

Strona 249 - Repository Client and Server

Chapter 18: How to use XML Digital Signature with ebXML Message Service 18-2

Strona 250

Index-1 Index access control, B-4 Acquiring and Registering Certificates (for both the Server and Client), 10-4 Append a User Name and a Password, 15-

Strona 251 - Part V

Security System Guide - Index Index-2 Configuring the Interstage Certificate Environment with CSR, 7-8 Configuring the Interstage Certificate Environm

Strona 252

Security System Guide - Index Index-3 parameters, 4-8 setup, 4-8 writing HTML, 4-7 HTTP Tunneling Setup, 4-4 HTTP-IIOP gateway, 4-4 IJServer execution

Strona 253 - Chapter 13

Security System Guide - Index Index-4 threat countermeasures, 1-9 J2EE deployment tool security measures, 2-15 unauthorized resource file access, 2-15

Strona 254 - Digital Signature Function

Security System Guide - Index Index-5 CORBA Service, A-4 EJB Service, A-16 EJB Service operation, A-18 environment, A-17 environment construction, A-1

Strona 255

Security System Guide - Index Index-6 Settings for Encryption Using the XML Encryption, 15-16 Settings for the Generation of the SOAP Digital Signatur

Strona 256 - Function

Web Services 1-11 Web Services Web services can be used with the following products: • Interstage Application Server Enterprise Edition • Interstage

Strona 257 - SOAP Messages

Chapter 1: Security Risks 1-12 Database Linkage Service The Database Linkage Service can be used with the following products: • Interstage Applicati

Strona 258 - Communication via the Proxy

Database Linkage Service 1-13 Resources to be Protected The following table lists the resources used when the database linkage service is used. If hi

Strona 259 - Services (SOAP)

Chapter 1: Security Risks 1-14 The following describes the locations of the resources to be protected: • Folder storing the OTS system information

Strona 260 - Property name Value

Database Linkage Service 1-15 Possible Threats to Resources The following describes the possible security risks to the database linkage service: Table

Strona 261

Chapter 1: Security Risks 1-16 Countermeasures Against Threats For the database linkage service, the following are effective measures against securit

Strona 262 - Operation

Database Linkage Service 1-17 Using only the authorization of the selected users, start construction of the environment and operation of the database

Strona 263 - Certificate Environment

Security System Guide - Preface iv Organization of this Document This document is organized as follows: Part I Security Risks and Measures • Chapter

Strona 264

Chapter 1: Security Risks 1-18 Periodic Backup If you backup information periodically, you can restore the environment even if the information is tam

Strona 265

OLTP Function 1-19 OLTP Function The OLTP function can be used with the following products: • Interstage Application Server Enterprise Edition • Int

Strona 266

Chapter 1: Security Risks 1-20 Resources to be Protected The following table lists the resources when an OLTP application is used. If high security

Strona 267

OLTP Function 1-21 Possible Threats to Resources The following describes the possible security threats posed to resources to be protected in operation

Strona 268

Chapter 1: Security Risks 1-22 Resource to be protected Possible threat Naming Service for load balance Tampering of data recorded in the file Expl

Strona 269

OLTP Function 1-23 Countermeasures Against Tampering of Data Recorded in the File There are environment definition files and other such files in the o

Strona 270

Chapter 1: Security Risks 1-24 Smart Repository The Smart Repository function can be used with the following products: • Interstage Application Serv

Strona 271

Smart Repository 1-25 Potential Security Threats The following indicates the potential security threats to the resources requiring Smart Repository pr

Strona 272

Chapter 1: Security Risks 1-26 Password Encryption When an entry search is requested from a client to Smart Repository, the password included in an

Strona 273 - Using a CORBA/SOAP Gateway

Smart Repository 1-27 Periodic Data Backup By performing data backup periodically, the environment can be restored even if information is altered thro

Strona 274

Security System Guide - Preface v Part V Security Systems for Web Services (SOAP) • Chapter 13 Security Functions for Web Services (SOAP) This chapt

Strona 275 - Chapter 15

Chapter 1: Security Risks 1-28 Interstage Single Sign-on This section explains the security threats for Interstage single sign-on and the countermeas

Strona 276

Interstage Single Sign-on 1-29 Possible Threats This section explains the possible threats when using Interstage Single Sign-on. Deleting, Rewriting,

Strona 277

Chapter 1: Security Risks 1-30 Application Risk Interstage Single Sign-on stores important information in the Web browser cookie. The attacker could

Strona 278 - Setting User Information

Interstage Single Sign-on 1-31 Protecting Communication Contents Encryption is an effective way of protecting communication contents from being rewrit

Strona 279

Chapter 1: Security Risks 1-32 Difficult-to-guess Password Use a password that cannot be easily guessed by others or identified mechanically by some

Strona 280

Interstage Single Sign-on 1-33 Operating and Managing a Business Server To prevent unauthorized access to the protection resources of the business ser

Strona 281

Chapter 1: Security Risks 1-34 For Java Applications Using Single Sign-on JavaAPIs Possible threat Action Application alteration - Periodically ch

Strona 282

Multi Server Management 1-35 Multi Server Management This section describes how to deal with security threats using Multi Server Management. The Admin

Strona 283

Chapter 1: Security Risks 1-36 Configuration Model When using Multi Server Management, the LAN for the flow of the actual business data and the LAN f

Strona 284 - Preparing a Private-key

Multi Server Management 1-37 Figure 1-2 Multi Server Management Configuration Model In a typical Multi Server Management configuration, one Admin Se

Strona 285

Security System Guide - Preface vi

Strona 286

Chapter 1: Security Risks 1-38 Resources to be Protected This section describes the resources to be protected when Multi Server Management is used. F

Strona 287

Multi Server Management 1-39 Threat Prevention The following table lists countermeasures that can be taken against possible security risks. Table 1-14

Strona 288

Chapter 1: Security Risks 1-40 Countermeasures Against Exploitation of Information Recorded in Files The information required for operation of the In

Strona 289

Configuration Management Function 1-41 Configuration Management Function This section describes how to deal with security threats using the Configurat

Strona 290 - Preparing a Site Certificate

Chapter 1: Security Risks 1-42 Resources to be Protected The following resources are used in the Interstage Management Console. If advanced security

Strona 291

Configuration Management Function 1-43 Countermeasures Against Overwriting Information Recorded in Files Various items of Interstage information are s

Strona 292

Chapter 1: Security Risks 1-44

Strona 293

2-1 Chapter 2 Security Measures Generally, the services alone cannot completely protect resources from security attacks. Taking operational measure

Strona 294 - Preparing a Private Key

Chapter 2: Security Measures 2-2 Common Security Measures This section explains the following topics: • Notes on User Accounts • Backup • Notes on

Strona 295

Security Measures for Interstage Operation Tool 2-3 Security Measures for Interstage Operation Tool The Interstage Operation Tool can be used with the

Strona 296

vii Table of Contents Chapter 1 Security Risks Interstage Management Console and Interstage Operation Tool...

Strona 297 - Fault Codes

Chapter 2: Security Measures 2-4 Security Measures for Operation of the Web Server (Interstage HTTP Server) This section explains the following topic

Strona 298 - Fault code Explanation

Security Measures for Operation of the Web Server (Interstage HTTP Server) 2-5 • IP access control: It is possible to permit access only to specific

Strona 299 - Supported Algorithms

Chapter 2: Security Measures 2-6 Risk of Exploiting the HTTP TRACE Method Malicious users (or machines) on the network may read private information i

Strona 300

Security Measures for Operation of the Web Server (Interstage HTTP Server) 2-7 LoadModule rewrite_module libexec/mod_rewrite.so AddModule mod_re

Strona 301

Chapter 2: Security Measures 2-8 Making all documents, except for “user3” and “user4”, under “user home directory/public_html” public. UserDir pub

Strona 302

Security Measures for Operation of the Web Server (InfoProvider Pro) 2-9 Security Measures for Operation of the Web Server (InfoProvider Pro) The I

Strona 303 - Chapter 16

Chapter 2: Security Measures 2-10 Security Measures for the Servlet Service This section explains the following topics: • Notes on the Use of Sessio

Strona 304 - System)

Security Measures for the Servlet Service 2-11 Notes on Communication Data Possible threats to communication between the Web server connector and Serv

Strona 305

Chapter 2: Security Measures 2-12 Security Measures for the EJB Service This section gives an outline of security risks when the EJB service is used.

Strona 306

Security Measures for the EJB Service 2-13 Possible Threats to Resources The following countermeasures can defend EJB Service against security invasio

Strona 307

Security System Guide: Table of Contents viii Operations Confined to Specific Users...

Strona 308

Chapter 2: Security Measures 2-14 Selection of Specific Users By fixing the operators of the entire system to a pre-specified set of users, you can p

Strona 309

Security Measures for J2EE Deployment Tool 2-15 Security Measures for J2EE Deployment Tool This topic explains the following topic: • Unauthorized Ac

Strona 310

Chapter 2: Security Measures 2-16 Security Measures for the J2EE Resource Access Definition This section explains the following topic: • Leakage of

Strona 311

Security Measures for Interstage JMS 2-17 Security Measures for Interstage JMS Interstage JMS can be used with the following products: • Interstage A

Strona 312

Chapter 2: Security Measures 2-18 Security Measures for CORBA Service This section explains the following topics: • Unauthorized Access to Resource

Strona 313

Security Measures for CORBA Service 2-19 These files may be exposed to the threat of unauthorized access from an ill-intentioned person. To protect th

Strona 314

Chapter 2: Security Measures 2-20 Security Measures for Portable-ORB Portable-ORB can be used with the following products: • Interstage Application

Strona 315

Security Measures for Portable-ORB 2-21 Notes on Creation and Operation of Java Applet Be careful about the following points when creating and operati

Strona 316

Chapter 2: Security Measures 2-22 Security Measures for Event Service Event service can be used with the following products: • Interstage Applicatio

Strona 317 - Service

Security Measures for IJServer Operation 2-23 Security Measures for IJServer Operation IJServer is an operating environment for JEEE applications. Una

Strona 318

Security System Guide - Table of Contents ix Setting Access Permission for Operating Resources...

Strona 319 - Chapter 17

Chapter 2: Security Measures 2-24 Security Measures Concerning Operation of Smart Repository Smart Repository can be used with the following products

Strona 320

Security Measures for Fujitsu Enabler 2-25 Security Measures for Fujitsu Enabler This section explains how to configure the security settings for the

Strona 321 - Chapter 18

Chapter 2: Security Measures 2-26 Measures for Multi server Management This section explains the use of "roles" in Multi server Management.

Strona 322

Measures for Configuration Manager 2-27 Measures for Configuration Manager This section explains the security measures for the Configuration Manager.

Strona 323

Chapter 2: Security Measures 2-28

Strona 324

Part II Authentication and Access Control

Strona 326

3-1 Chapter 3 Authentication and Access Control for the Interstage HTTP Server This chapter describes the authentication and access control that Int

Strona 327

Chapter 3: Authentication and Access Control for the Interstage HTTP Server 3-2 Types of Authentication There are three types of authentication, as s

Strona 328

Types of Authentication 3-3 Remarks When SSL is used between the client and the server for user authentication, the user name and the password are enc

Komentarze do niniejszej Instrukcji

Brak uwag