Summary

This chapter covered two powerful concepts that will enable you to add security to your WebSphere environment. They are authentication as applied to resources and data encryption:

  • Whenever possible, move the authentication to resources aspect out of the application. Create JASS-J2C aliases at the resource level to provide the credentials needed to access the back-end resource. This technique can be easily applied to JDBC Data Sources and to JMS Queues.
  • If the nature of the data exchanged with a back-end resource is sensitive, apply encryption to the channel. The preferred form is to use SSL communication. If that is not possible, research other alternatives such as VPNs.

I feel full of energy; I am not sure about you. This chapter seemed short in comparison with the previous one. Perhaps I miss having a mini project. So go get a cup of tea and let's move onto the next chapter, WebSphere default installation hardening. What do you say?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.152.93