IBM BS029ML Self Help Guide - Page 107

Portal Access Control (PAC), Login point, The flow, Artifact, Description

Page 107 highlights

Login point Other applications through SSO. External Security Manager through TAI SSL client certificates The flow The LTPA in the client request triggers WebSphere Application Server to create the security context with the user credentials and passes it to Portal login. The LoginUser engine command is then triggered. WebSphere Application Server checks LTPA first. If none exists, the TAI configured in WebSphere Application Server trusts the ESM and creates the LTPA for the user, and sends the security context to Portal Login. WebSphere Application Server authenticates the user through the client certificate, and builds and passes the subject to Portal Login To obtain details, refer to the white paper Understanding and configuring WebSphere Portal login and logout, found at: http://www.ibm.com/developerworks/websphere/library/techarticles/0706_buchwald/070 6_buchwald.html 4.1.6 Portal Access Control (PAC) The access level of a user to a portal resource is measured by the actions he can apply on the resource. In the portal environment, these actions are view/read, update/write, delegate, traverse, and delete. For different types of resources, different set of actions are applicable. A set of fixed role types are defined in portal access model for management, each one of which is represented by a set of actions (called actionset) that can be applied to the resources. The Portal Access Control (PAC) authorization model is based on the concepts of protected resources and the hierarchy these resources build up. It contains a set of fine-grained configurations for portal resources, such as pages, portlets, services, and global settings. They provide a full range of control settings from an easy and simple solution to fairly complicated enterprise level systems. The artifacts defined by the PAC model are summarized in Table 4-2. Table 4-2 PAC artifacts Artifact Protected Resources Protected resource hierarchy Virtual resources Role types Role Role block Ownership Description Represent a set of portal artifacts protected by the portal, and they are divided into four domains. Starting from a set of virtual resources to form a tree structure, with virtual resource PORTAL at the top root. A set of virtual objects created during portal installation to form the roots of the protected resource hierarchy. Formed by the action-sets that can be applied to resources. An instance of a role type with a specific resource. A configuration set to block role inheritance or propagation. Unrestricted access to the resource by the owner. Chapter 4. WebSphere Portal security 93

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

Chapter 4. WebSphere Portal security
93
To obtain details, refer to the white paper
Understanding and configuring WebSphere Portal
login and logout
, found at:
6_buchwald.html
4.1.6
Portal Access Control (PAC)
The access level of a user to a portal resource is measured by the actions he can apply on
the resource. In the portal environment, these actions are view/read, update/write, delegate,
traverse, and delete. For different types of resources, different set of actions are applicable. A
set of fixed role types are defined in portal access model for management, each one of which
is represented by a set of actions (called actionset) that can be applied to the resources.
The Portal Access Control (PAC) authorization model is based on the concepts of protected
resources and the hierarchy these resources build up. It contains a set of fine-grained
configurations for portal resources, such as pages, portlets, services, and global settings.
They provide a full range of control settings from an easy and simple solution to fairly
complicated enterprise level systems.
The artifacts defined by the PAC model are summarized in Table 4-2.
Table 4-2
PAC artifacts
Other applications through SSO.
The LTPA in the client request triggers WebSphere Application
Server to create the security context with the user credentials
and passes it to Portal login. The LoginUser engine command
is then triggered.
External Security Manager
through TAI
WebSphere Application Server checks LTPA first. If none exists,
the TAI configured in WebSphere Application Server trusts the
ESM and creates the LTPA for the user, and sends the security
context to Portal Login.
SSL client certificates
WebSphere Application Server authenticates the user through
the client certificate, and builds and passes the subject to Portal
Login
Login point
The flow
Artifact
Description
Protected Resources
Represent a set of portal artifacts protected by the portal, and
they are divided into four domains.
Protected resource hierarchy
Starting from a set of virtual resources to form a tree structure,
with virtual resource PORTAL at the top root.
Virtual resources
A set of virtual objects created during portal installation to form
the roots of the protected resource hierarchy.
Role types
Formed by the action-sets that can be applied to resources.
Role
An instance of a role type with a specific resource.
Role block
A configuration set to block role inheritance or propagation.
Ownership
Unrestricted access to the resource by the owner.