O'Reilly logo

IBM WebSphere V5.0 Security: WebSphere Handbook Series by Stephen Pipes, Rao Maheshwar, David Leigh, Floyd Langley, Piotr Kisielewicz, Paul Creswick, Derek Carpenter, Peter Kovari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

10.4. Configuring a user registry

Configuring a user registry for the application server is closely related to security, although you should note that global security does not have to be enabled in order to use a user registry configured for WebSphere. For example, you can deploy your application and assign groups and users from the actual user registry without security being enabled for the application server.

A brief description of user registries is provided in “User registry” on page 224. For information regarding the development of a custom registry, refer to “Developing a custom registry” on page 184.

When WebSphere performs authentication, it sends a request to the appropriate registry. This authentication request may be sent under an ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required