Middle-Tier Security |
To determine how to implement middle-tier security, you should consider your organization's internal security policies, the security mechanisms that are in place in your environment, the types of users who will need to access the Web applications, and the types of content that will be made available.
Important concepts and tasks concerning middle-tier security are as follows:
Authentication. For a detailed discussion of different types of authentication and configuration guidelines, see "Authentication Mechanisms" in the SAS Intelligence Platform: Security Administration Guide. For information about configuring Web authentication for JBoss, IBM WebSphere, or Oracle WebLogic, go to http://support.sas.com/resources/thirdpartysupport/v92/.
SAS Anonymous Web User. See Using the SAS Anonymous Web User With SAS Authentication.
Multicast Security. See Multicast Security.
Single Sign-On. See Using Single Sign-On Among Web Applications.
Secure Sockets Layer (SSL). See Using Secure Sockets Layer (SSL) for Web Applications.
Restrictive Policy Files. See Configuring and Deploying Restrictive Policy Files.
Copyright © 2010 by SAS Institute Inc., Cary, NC, USA. All rights reserved.