Administering the private UDDI  Chapter 8: Using wstool, wstkeytool, wstant, and wstkeytoolant

Chapter 7: The Private UDDI Server

Controlling access to resources

You can implement a flexible authorization policy using roles. Membership in a role determines the level of authoriization for a given user. There are three roles that are predefined as Web application roles and used for the private UDDI server:

You can map these roles to any EAServer role to enforce the desired authorization policy. See Chapter 3, “Using Web Application Security,” in the EAServer Security Administration and Programming Guide for information about roles and role mapping.In a development environment, you might want to map the UddiAdmin role to EAServer’s Admin role, and map the other two roles to “everyone.” In this case, any authenticated user is considered a member of the role and can publish and query. Only the jagadmin user can modify published data and UDDI configuration settings.

The default security policy permits unauthenticated users to query the UDDI registry. However, you can modify the policy by defining the UddiInquire role for the Web application.

StepsMapping UDDI registry roles

  1. Connect to the private UDDI server (UDDI on localhost).

  2. Expand the Administration folder.

  3. Highlight the Security Administration folder. The UDDI registry roles display in the right pane.

  4. Each role is mapped to an EAServer role. To change the role mapping, select an EAServer role from the drop-down list to which you want to map the UDDI role. Click Apply to apply the changes.


Using security constraints

In addition to using roles to enforce security, you can use secure transport connections when publishing information to the UDDI server. By setting the appropriate security constraints for the private UDDI Web application, the EAServer Web container enforces HTTPS access for publish only.

See Chapter 3, “Using Web Application Security,” in the EAServer Security Administration and Programming Guide for information about establishing security constraints.





Copyright © 2005. Sybase Inc. All rights reserved. Chapter 8: Using wstool, wstkeytool, wstant, and wstkeytoolant

View this book as PDF