O'Reilly logo

IBM WebSphere Application Server v7.0 Security by Omar Siliceo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Configuring User Authentication and Access

Not too long before this chapter was written there was an interesting turn of events that could help us visualize our topic. In November of 2009, the President of the United States of America hosted a State Dinner honoring the Prime Minister of India. In this type of formal and ceremonious event, there are well-defined groups of participants. For instance, you may have the hosts, the guests of honor and other important guests, security personnel, military members, service people, media, and on occasions, crashers. The underlying principles that surround a State Dinner may help us to better understand the concepts of security domains, user registries, authentication, and authorization of users ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required