O'Reilly logo

Getting Started with IBM WebSphere sMash by Brett King, Karl Bishop, Ron Lynn

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Security Model

Web application security is an obvious requirement in essentially any corporate project, but one that is often underestimated or forgotten. WebSphere sMash provides a rich set of features to assist in hardening your projects to meet today’s stringent requirements. In this chapter, we discuss the different areas where WebSphere sMash security is used to prevent the bad guys from running roughshod over your site and accessing your company’s private data. There are several facets of the security model that we need to cover, as shown in Figure 9.1.

Figure 9.1 Security characteristics

image

Secure messaging consists of the following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required