InfoCenter Home >
6: Administer applications >
6.6: Tools and resources quick reference >
6.6.18: Securing applications >
6.6.18.1: Securing applications with the Java administrative console >
6.6.18.1.1a: Specifying global settings with the Java administrative console

6.6.18.1.1a: Specifying global settings with the Java administrative console

  1. Start the Security Center by clicking Console -> Security Center from the console menu bar.
  2. Complete the task, referring to the information below for assistance.
  3. Stop the administrative server and start it again for the changes to take effect.

    The next time the administrator opens the WebSphere Administrative Console, the administrator will be prompted to log in (if security has been enabled), using an ID and password specified during Security Center configuration.

General

Use the General tab to specify whether to enable security. If the check box is not selected, any other security settings you specify will be disregarded.

This page also contains an option for setting a security cache timeout. The security system caches authentication lookup information it receives from the user registry or directory service. Use this field to specify how long to cache the information (in seconds). Caching can improve lookup performance.

Authentication

Use the Authentication tabbed page to specify how to authenticate the information presented by users trying to access an application or resources.

The administrator can have users or groups authenticated against either the local operating system user registry (such as Windows NT User Manager program) or an LDAP or custom user registry.

Role Mapping

Use the Role Mapping page to assign users in particular groups to specific roles. Role mapping gives particular users or groups authorization to access one or more applications defined by a role.

The users, groups and roles were defined when the application was installed or configured.

Run As Role Mapping

Use the Run As Role Mapping page to assign only one user to a specific role. The application is delegated to that user. Any user who knows the assigned user's ID and password can access the application.

Administrative Roles

Use the Administrative Roles page to map an administrative role to at least one user or group.

Go to previous article: Securing applications with the Java administrative console Go to next article: Securing cloned applications

 

 
Go to previous article: Securing applications with the Java administrative console Go to next article: Securing cloned applications