Overview  Authentication

Chapter 6: Security

Understanding CSI

Common Security Infrastructure (CSI) is a security framework that enables Unwired Accelerator to work with an existing security system. A CSI realm works with a security provider to support authentication and authorization. The CSI realm component plugs in to a Tomcat 4.1.29 Web application container or an EAServer 5.2 application server.

A CSI realm is an abstract interface to security information such as user names, passwords, and role membership. When a user logs in to Unwired Accelerator, the user’s name and password are verified against the data server, and if valid, role information is retrieved to provide Tomcat or EAServer with a list of the user’s roles. The user’s session is assigned a context identifier and logged in a table; retrieving the context identifier retrieves the context of the session.

CSI treats the security provider as a read-only store of security information. It does not expose any interfaces to allow for security administration and management. Because CSI provides a read-only view of security data, the Portal Interface or Mobile Web Studio do not make changes to the security data. Most messages are logged through the Jakarta-common logging framework and available through log files. Some messages, such as password expiration and similar warnings, are passed through to CSI.

The CSI realm can use either the PortalDB or the LDAP security provider. By default, CSI is configured with the PortalDB security provider and uses the portaldatabase (also known as PortalDB) to store security information. The LDAP security provider uses an LDAP server. The AuthenticationUsing property setting in the global.properties.xml file identifies the security provider used (“Database” for PortalDB, “CSI” for LDAP, or “EP Security” for Enterprise Security). See the Unwired Accelerator Installation Guide for information about reconfiguring the security provider used with CSI.





Copyright © 2005. Sybase Inc. All rights reserved. Authentication

View this book as PDF