To determine
how to implement middle-tier security, you should consider your organization's
internal security policies, the security mechanisms that are in place
in your environment, the types of users who need to access the
Web applications, and the types of content that you plan to make available.
Important concepts and
tasks concerning middle-tier security are as follows:
-
Authentication. For a detailed
discussion of different types of authentication and configuration
guidelines, see “Authentication Mechanisms” in the
SAS Intelligence Platform: Security Administration Guide. For information about configuring Web authentication
for JBoss, IBM WebSphere, or Oracle WebLogic, see
http://support.sas.com/resources/thirdpartysupport/v93/
.
-
-
-
-
-