Authentication: The user is who they claim to be
Authorization: The user has access to the right application objects
Availability: The applications are available to the user for access
Privacy: The information is encrypted between the server and the user
Integrity: The information is guaranteed NOT to have changed since it was generated on the client or the server during transmission
My company, ebt-now, is a WebFacing services provider so we help customers develop the security solutions they need specifically for a given environment:
- We can put up a simple security front end that authenticates a user against a DB2 table or an LDAP directory server (then you don't have to assign all remote users an iSeries user profile for instance)
- We setup secure environments using SSL with WebSphere, WebSphere Express, Tomcat and Apache HTTP server as needed.
MORE INFORMATION ON THIS TOPIC
Check out these Best Web Links on Web development.
Ask the Experts yourself: Our Web development gurus are waiting to answer your questions.
Ask your Web development & WebSphere questions -- or help out your peers by answering them--in our .fMFNafNPDOX.2@.ee84637!viewtype=&skip=&expand=>WebSphere & Web Development Forum.
Dig Deeper on Web Tools
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.