3D PLM Enterprise Architecture

JDialog

Security with JDialog

How to deploy security on JDialog Applications
Technical Article

Abstract

This article shows how to personalize (add, remove and configure, your PO access drivers). 

What You Will Learn With This Technical Article

The security allow the administrator to restrict the access to the application to authorized people only

The first question when installing security is to ask "Who made What and Who can access What?"

The security is very important to keep integrity and confidentiality of the data .

This technical article is intended to show you how to configure the security on you JDialog Applications:

  1. Pre-deployment on your Workspace,
  2. Configuring IRAD6 for security,
  3. Testing security,
  4. Exporting EAR file with security for deployment on Websphere
[Top]

The CAAJdgSecurity Technical Article

CAAJdgSecurity is a technical article of the CAAJDialog.edu framework that illustrates CATJDialog framework capabilities.
[Top]

How to deploy security 

It's important to install security to limit the access of data to authorized people only.

We will see step by step how to deploy security

[Top]

Pre-deployment on your Workspace

Make sure you have the last version of JDialog

To install the security, you must run the "mkrun -c eclipsesetup" command line on your WS.

The web.xml file is update and the security role and mapping are configured.

[Top]

Configuring IRAD6 for security

After the pre-deployment, you must refresh your project on IRAD6,

Be sure your configuration is correct by watching your web.xml file in webapplication/WEB-INF/ folder

In the security tab you can see tow predefine roles:

In the Pages panel of this file, you can define your Login process (by default we have a Basic IE Panel)

 

In the server-cfg.xml, you must enable security as the next panel in the security Panel, for the server ID, define the user ID under which the server runs, for security purposes. This ID is not associated with the system process.

 

In the application.xml file, you must go to the security Panel and then choose "Gather Roles from Modules"

Finally in the ibm-application-bnd.xmi file, you must bind the roles on the Security Bindings Panel

[Top]

Testing security

After restarting your server, try to access JDialog, a Panel will open and then everyone can access with his NT Password if the security is successfully installed.

Your application is now secure.

[Top]

Exporting EAR file with security for deployment on Websphere

To deploy your application with the security, you must launch the command "mkrun -c WASSetup -ear PathToEar"

An EAR is generated and you can deploy it on Websphere

Note: Be sure to have the good version of Websphere and all the fix pack installed and security center well configured.

Finally, try to access JDialog, you must have the same comportment you have with IRAD6.

 

[Top]

History

Version: 1 [Jun 2002] Document created
[Top]

Copyright © 1994-2002, Dassault Systèmes. All rights reserved.