Cloud CM-IPMP Anleitung zur Fehlerbehebung Seite 97

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 201
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 96
Chapter 15
Security Configuration
15.1 Introduction
Security in the JAIN SLEE is an essential component of the Rhino SLEE architecture. It provides access control for
1. MLet extensions.
2. Resource Adaptors.
3. Node administration.
4. Cluster management.
The operational capabilities of Rhino SLEE allow a deployment to operate securely and reliably. A vendor can;
1. Relax or strengthen the security of the SLEE using Java policy based security.
2. Sign deployable units (jars) and grant permissions to signed code (SBBs, resource adaptors, services).
3. Contextualise security for user authentication and authorisation.
4. Integrate context security with enterprise systems, identity servers and databases.
The installation configures the standard Rhino SLEE security,
1. Creates default user-names and passwords.
2. Creates public and private key stores.
3. Generates basic key pairs and certificate chains.
4. Imports certificates into the public key stores.
5. Enables the Java Security Manager.
15.2 Security Policy
The security model is based on the standard Java security and the Java Authentication and Authorisation Service (JAAS) models.
The security subsystem provides a rigid level of systems integration and granular code level security which prevents untrusted
Resource Adaptors, MLets, SBBs or human users from performing restricted functions in the container environment.
A Rhino library code-base is protected in the file located at
$RHINO_HOME/etc/defaults/config/rhino.policy
. MLets
security are declared by protection domain grants issued in the
security-spec
section of the
$RHINO_NODE_HOME/config/
permachine-mlet.conf file.
88
Seitenansicht 96
1 2 ... 92 93 94 95 96 97 98 99 100 101 102 ... 200 201

Kommentare zu diesen Handbüchern

Keine Kommentare