There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.How should the administrator meet this requirement and restrict Configurator role access for a single application?
How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the servers file system?
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub- trees for business users and administration users.What should the administrator do to implement the required security configuration?
A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changed so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.How should the administrator do this?
A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.How can a system administrator fix the issue ensuring only authorized access?
A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.How can the administrator handle this requirement?