Tutorial: Integrate WebSphere eXtreme Scale security with WebSphere Application Server
This tutorial demonstrates how to secure a WebSphere® eXtreme Scale server deployment in a WebSphere Application Server environment.
Learning objectives
The learning objectives for this tutorial follow:- Configure WebSphere eXtreme Scale to use WebSphere Application Server authentication plug-ins
- Configure WebSphere eXtreme Scale transport security to use WebSphere Application Server CSIv2 configuration
- Use Java™ Authentication and Authorization Service (JAAS) authorization in WebSphere Application Server
- Use a custom login module for group-based JAAS authorization
- Use WebSphere eXtreme Scale xscmd utility in WebSphere Application Server environment
Time required
This tutorial takes approximately 4 hours from start to finish.- Introduction: Integrate WebSphere eXtreme Scale security with WebSphere Application Server using the WebSphere Application Server Authentication plug-ins
In this tutorial, you integrate WebSphere eXtreme Scale security with WebSphere Application Server. First, you configure authentication with a simple web application that uses authenticated user credentials from the current thread to connect to the ObjectGrid. Then, you investigate the encryption of data that is transferred between the client and server with transport layer security. To give users varying levels of permissions, you can configure Java Authentication and Authorization Service (JAAS). After completing the configuration, you can use the xscmd utility to monitor your data grids and maps. - Module 1: Prepare WebSphere Application Server
Before you start the tutorial to integrate with WebSphere eXtreme Scale, you must create a basic security configuration in WebSphere Application Server. - Module 2: Configure WebSphere eXtreme Scale to use WebSphere Application Server Authentication plug-ins
After you have created the WebSphere Application Server configuration, you can integrate WebSphere eXtreme Scale authentication with WebSphere Application Server. - Module 3: Configure transport security
Configure transport security to secure data transfer between the clients and servers in the configuration. - Module 4: Use Java Authentication and Authorization Service (JAAS) authorization in WebSphere Application Server
Now that you have configured authentication for clients, you can further configure authentication to give different users varying permissions. For example, an operator user might only be able to view data, while an administrator user can perform all operations. - Module 5: Use the xscmd tool to monitor data grids and maps
You can use the xscmd tool to show the primary data grids and map sizes of the Grid data grid. The xscmd tool uses the MBean to query all of the data grid artifacts, such as primary shards, replica shards, container servers, map sizes, and so on.