Introduction: Integrate WebSphere eXtreme Scale security with WebSphere Application Server using the WebSphere Application Server Authentication plug-ins

In this tutorial, you integrate WebSphere® eXtreme Scale security with WebSphere Application Server. First, you configure authentication with a simple web application that uses authenticated user credentials from the current thread to connect to the ObjectGrid. Then, you investigate the encryption of data that is transferred between the client and server with transport layer security. To give users varying levels of permissions, you can configure Java Authentication and Authorization Service (JAAS). After completing the configuration, you can use the xscmd utility to monitor your data grids and maps.

This tutorial assumes that all of your WebSphere eXtreme Scale clients, container servers, and catalog servers are deployed in the WebSphere Application Server environment.

Learning objectives

The learning objectives for this tutorial follow:
  • Configure WebSphere eXtreme Scale to use WebSphere Application Server authentication plug-ins
  • Configure WebSphere eXtreme Scale transport security to use WebSphere Application Server CSIv2 configuration
  • Use Java™ Authentication and Authorization Service (JAAS) authorization in WebSphere Application Server
  • Use a custom login module for group-based JAAS authorization
  • Use WebSphere eXtreme Scale xscmd utility in WebSphere Application Server environment

Time required

This tutorial takes approximately 4 hours from start to finish.

Skill level

Intermediate.

Audience

Developers and administrators that are interested in the security integration between WebSphere eXtreme Scale and WebSphere Application Server.

System requirements and topology

This tutorial uses four WebSphere Application Server application servers and one deployment manager to demonstrate the sample.

Prerequisites

A basic understanding of the following items is helpful before you start this tutorial:
  • WebSphere eXtreme Scale programming model
  • Basic WebSphere eXtreme Scale security concepts
  • Basic WebSphere Application Server security concepts
For a background information about WebSphere eXtreme Scale and WebSphere Application Server security integration, see Security integration with WebSphere Application Server.
Related conceptsSecurity overviewWebSphere eXtreme Scale can secure data access, including allowing for integration with external security providers.Related informationWebSphere Application Server: Securing applications and their environment