User guide
Security System Guide - Table of Contents
xi
Security Measures for Portable-ORB ...........................................................................................2-20
Unauthorized Access to Resource Files..................................................................................2-20
Notes on Communication Data................................................................................................2-20
Notes on Creation and Operation of Java Applet....................................................................2-21
About Authorization Settings ..............................................................................................2-21
About Errors and Exceptions..............................................................................................2-21
Security Measures for Event Service............................................................................................2-22
Unauthorized Access to Resource Files..................................................................................2-22
Security Measures for IJServer Operation ...................................................................................2-23
Unauthorized Access to Resource Files..................................................................................2-23
Notes on IJServer Execution ...................................................................................................2-23
Security Measures Concerning Operation of Smart Repository...................................................2-24
About Operation.......................................................................................................................2-24
Blocking External Access.........................................................................................................2-24
Restriction of Services.............................................................................................................2-24
Notes on Accessing the Smart Repository Server ..................................................................2-24
Security Measures for Fujitsu Enabler..........................................................................................2-25
Account Used for Fujitsu Enabler ............................................................................................2-25
Measures for Multi server Management .......................................................................................2-26
Security Role Settings .............................................................................................................2-26
Measures for Configuration Manager ...........................................................................................2-27
Illegal Access to Resource Files..............................................................................................2-27
Chapter 3 Authentication and Access Control for the Interstage HTTP Server
Types of Authentication...................................................................................................................3-2
User Authentication (Basic Authentication)................................................................................3-2
IP Access Control.......................................................................................................................3-3
Online Collation...............................................................................................................................3-4
Setting the User Authentication ......................................................................................................3-5
Registering a User Password ....................................................................................................3-5
Editing the Environment Definition File......................................................................................3-6
Relating Directives.....................................................................................................................3-7
AuthName.............................................................................................................................3-8
AuthType...............................................................................................................................3-8
AuthUserFile.........................................................................................................................3-9
<Directory> ...........................................................................................................................3-9
Require ...............................................................................................................................3-10
Setting the IP Access Control .......................................................................................................3-11