ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamy_5.4.0.1/50/sec/secisobj.htm

69 lines
4.6 KiB
HTML
Raw Permalink Normal View History

2024-04-02 14:02:31 +00:00
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=utf-8">
<LINK rel="stylesheet" type="text/css" href="../../../rzahg/ic.css">
<title>Securing iSeries objects and files</title>
</head>
<BODY>
<!-- Java sync-link -->
<SCRIPT LANGUAGE="Javascript" SRC="../../../rzahg/synch.js" TYPE="text/javascript"></SCRIPT>
<h2><a name="secisobj"></a>Securing iSeries objects and files</h2>
<p>This topic discusses the various iSeries objects and files that contain sensitive information and need to be protected.</p>
<p><strong>Secure integrated file system files</strong></p>
<p>In addition to servlets and JSP files, the WebSphere administrative application and application servers access integrated file system stream files. The following files may contain sensitive information and should be given close consideration to ensure no unauthorized access is granted:</p>
<ul>
<li><p>Some files that are located in the <tt>properties</tt> subdirectory of your instance (for example, /QIBM/UserData/WebASE/ASE5/<em>instance</em>/properties) can contain user IDs and passwords.</p>
<p>By default, these files are shipped with *PUBLIC authority set to *EXCLUDE. The QEJBSVR user profile is granted *RX authority to these files. Additional protection is available through password encoding. For more information, see <a href="encoding.htm">Password encoding</a>.</p></li>
<li><p>In the <tt>etc</tt> subdirectory if your instance, all key (KDB) files and trust (JKS) files that you create for your WebSphere Application Server - Express instance should be protected:</p>
<ul>
<li>For the JKS files, the QEJBSVR user profiles should have *R authority and *PUBLIC should have *EXCLUDE authority.</li>
<li>For the KDB files, the user profile that the Web server is running under should have *RX authority and *PUBLIC should have *EXCLUDE authority.</li>
</ul></li>
</ul>
<p><strong>Secure the WebSphere server</strong></p>
<p>When you enable WebSphere security, the server's user profile and password are placed into server configuration files which should be maintained in a secure way using i5/OS system security. Additionally, some WebSphere resources can be password-protected, and these passwords are also placed in server configuration files. The server automatically encodes passwords to deter casual observation, but password encoding alone is not sufficient protection.</p>
<p>These files are located in the <tt>config</tt> subdirectory of your instance, and they can contain user identifiers and passwords:</p>
<ul>
<li>config/cells/<em>cell_name</em>/security.xml</li>
<li>config/cells/<em>cell_name</em>/nodes/<em>node_name</em>/resources.xml</li>
<li>config/cells/<em>cell_name</em>/nodes/<em>node_name</em>/servers/<em>server_name</em>/server.xml</li>
</ul>
<p>where <em>cell_name</em> is the name of the cell, <em>node_name</em> is the name of the node, and <em>server_name</em> is the name of the application server.</p>
<p>The server's user profile and password are used for authenticating the server when it initializes. This authentication is required for these reasons:</p>
<ul>
<li>The user ID and password are used as the System Identity for the server when a bean's security has been deployed to use SYSTEM_IDENTITY for method delegation. In this case, the user ID and password are used when method calls are are made from one enterprise bean to another.</li>
<li>The user ID and password are used to authenticate servers for inter server communication. Because security for these files may be compromised, use a non-default user profile for the server identity and password. The default user profile is QEJBSVR. If you use the Local Operating System (LocalOS) user registry (i5/OS), you may choose to create and use an iSeries user profile that has no special authorities. For more information, see <a href="isprfchg.htm">Run application servers under specific user profiles</a>.</li>
</ul>
<p><strong>WebSphere user profiles</strong></p>
<p>When it is first installed, by default WebSphere Application Server - Express uses the following iSeries user profiles:</p>
<ul>
<li><p><strong>QEJB</strong>
<br>This profile provides access to some administrative data, including passwords.</p></li>
<li><p><strong>QEJBSVR</strong>
<br>This profile provides the context in which your WebSphere application server runs. For security or administrative purposes, you may want to create other user profiles under which to run various parts of WebSphere Application Server - Express. For more information, see <a href="isprfchg.htm">Run application servers under specific user profiles</a>.</p></li>
</ul>
</body>
</html>