IBM BS029ML Self Help Guide - Page 119

Typical portal traces for different security scenarios

Page 119 highlights

files, such as ConfigTrace.log, SystemOut.log, and SystemErr.log, as well as trace.log, if any traces are enabled. Always keep the evidence for the "crime scene". A verification checklist of a working system with security enabled After the security is enabled, the first thing we would like to do is to verify whether the configuration is correct. The following is a generic list, which should be applicable to most cases: The configuration task ran successfully. (BUILD SUCCESSFUL!) You can start the application server and portal server using the administration user (WasUserid) configured for WebSphere Application Server. You can log in to WebSphere Administrative Console and Portal using the administration users respectively. The portal administration users are able to navigate to the administration portlets and conduct administration operations, such as create pages, search and add users and groups, install portlets, create virtual portals, and so on. The portal administrator user can assign users and groups of access permissions to resources, and verify them with proper user IDs 4.3.2 Typical portal traces for different security scenarios Here we discuss typical portal traces for different security scenarios. Recommendations for log settings How many times have we seen that customers spent several hours or even days to try to recreate a scenario, and ended up with a small log file without capturing the real data? This happens often because the default settings for runtime log and diagnostic trace files are usually too small, and should be changed to accommodate more data. Important: Always change the default size and historical copy settings for the runtime and diagnostic trace log files, such that critical error conditions are logged. Chapter 4. WebSphere Portal security 105

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

Chapter 4. WebSphere Portal security
105
files, such as ConfigTrace.log, SystemOut.log, and SystemErr.log, as well as trace.log, if any
traces are enabled. Always keep the evidence for the “crime scene”.
A verification checklist of a working system with security enabled
After the security is enabled, the first thing we would like to do is to verify whether the
configuration is correct. The following is a generic list, which should be applicable to most
cases:
±
The configuration task ran successfully. (BUILD SUCCESSFUL!)
±
You can start the application server and portal server using the administration user
(WasUserid) configured for WebSphere Application Server.
±
You can log in to WebSphere Administrative Console and Portal using the administration
users respectively.
±
The portal administration users are able to navigate to the administration portlets and
conduct administration operations, such as create pages, search and add users and
groups, install portlets, create virtual portals, and so on.
±
The portal administrator user can assign users and groups of access permissions to
resources, and verify them with proper user IDs
4.3.2
Typical portal traces for different security scenarios
Here we discuss typical portal traces for different security scenarios.
Recommendations for log settings
How many times have we seen that customers spent several hours or even days to try to
recreate a scenario, and ended up with a small log file without capturing the real data? This
happens often because the default settings for runtime log and diagnostic trace files are
usually too small, and should be changed to accommodate more data.
Important:
Always change the default size and historical copy settings for the runtime and
diagnostic trace log files, such that critical error conditions are logged.