|
Connector SecurityThe security information used by the connector to connect to the database or EIS system can be provided in three ways:
Specifying Container Authentication in the ConnectorThis the simplest configuration mechanism and is commonly used where all applications use the same set of credentials to authenticate to the back-end system. One disadvantage though is that the credentials are stored in plain text in the Connector configuration file; care should be take to secure access to this file. To authenticate in this manner, the
Specifying Container Authentication using a Security DomainUsing a Security Domain removes the authentication mechanism from the Connector definition and places it under the control of the Container's security system. This allows different mechanisms to be used in production and development configurations, and moves credentials from the Connector configuration files to a central security store. Which Security Domain to use is defined using a
The Security Domain must be able to generate credentials that are compatible with the JCA specification. This primarily involves including a reference to the JCA ManagedConnectionFactory in the PasswordCredential used. Two domains are included in the standard distribution that provide this functionality:
These are configured in Authenticating with Container Supplied IdentityUsing the ConfiguredIdentityLoginModule, all applications and application users connect to a back-end resource using a common identity. This is often used where system level authorization is not needed within the database and where all users share a common database account; this avoids the need to create database level accounts for application users. An example of such a configuration which connects the datasource defined above with username "scott" and password "tiger" would be:
Authenticating with Current Caller's IdentityUsing the CallerIdentityLoginModule, the identity of the current user can be passed through to the back-end system. This is often used where system level authorization is needed within the database and where all users have database accounts. An example of such a configuration which connects the datasource defined above would be:
Specifying Container Authentication in the ApplicationSome applications need to supply the credentials used to connect to the resource themselves rather than relying on values configured into the container. This can be specified using an For example, the following configuration allows the application to supply the authentication information used to connect to an Oracle database:
The application must specify the credentials every time it requests a connection by using the getConnection(String, String) method. Although this is flexible, it requires that the application have knowledge of the security mechanism used by the connector. An alternative approach which may offer greater portability is to allow the container to authenticate using the current caller's identity. |
|
||||||
© 2003 Core Developers Network Ltd "Core Developers Network", the stylized apple logo and "Core Associates" are trademarks of Core Developers Network Ltd. All other trademarks are held by their respective owners. Core Developers Network Ltd is not affiliated with any of the respective trademark owners. |