O'Reilly logo

IBM WebSphere V5.0 Security: WebSphere Handbook Series by Stephen Pipes, Rao Maheshwar, David Leigh, Floyd Langley, Piotr Kisielewicz, Paul Creswick, Derek Carpenter, Peter Kovari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

7.3. J2C security

This section briefly describes the J2EE Connector Architecture in WebSphere Application Server V5 and the security considerations related to connectors.

When using connectors, the application requests data from the connector and the connector gets the data from the resource and returns it to the application. But Enterprise Information Systems are generally very important applications and are protected from unauthorized access. So authentication information must be passed while requesting a connection.

7.3.1. Securing adapters

Connectors in WebSphere let you connect to resources such as data or an application on a remote server. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required