Easy400
 
Web Protection Made Easy
 
Overview
External protection
  Validation list utility
Application driven
 protection
 
 
National languages:
Contact us

 
 

iSeries 400 Web protection made easy

Giovanni's logo
1.  External protection
more on external protection

iSeries 400 web protection techniques are published

Web protection techniques are quite different from what an expert of traditional iSeries 400 security would expect, and therefore they are not so easy to be learnt on the fly.
This is why we wrote these pages.

They provide a walk through the "easiest" techniques, such as re-using traditional user profiles and using validation lists.
In the techniques that we go through, we provide examples of how you can implement protection, and test cases as well.

These web protection techniques have a number of advantages

  • they do not require you to do anything specific inside your pages (though they may result from the execution of a program); usually restricting authorities to the path or to the object itself is enough
  • dialog boxes for internet user logon are driven by your external protections; therefore your application does not have to be aware of them

We call these protection techniques external, inasmuch they can be defined on top of your web application. Your protection strategy may require an application to adopt some page naming convention, but apart from this your web application can be designed independently from your security strategy.

"External protections" are implemented through directives written in the configuration files of the appropriate HTTP servers. This can be done manually or through services (sometimes called wizards) which may be available in the HTTP ADMIN server. In our pages we provide the following:

  • for the Traditional HTTP server
    • examples of walk-through the ADMIN security services to generate security directives
    • examples of security directives
  • for the HTTPserver (powered by Apache)
    • examples of security directives

Click on the ...more info button above to display the details of this technique.


 
1a.  Validation list utility
more on validation list utility
If, after reading about the external protection you plan to base your protection on validation lists, you may need a special utility to manage validation list entries.
If you agree, please click on ...more info button above to display the details of this utility.

2.  Application driven protection
more on application driven protection
Though we believe that the adoption of these external protection techniques results into far better web protection architecture, we must admit that a number of iSeries 400 web developer would rather like to develop their own protection inside a web application. This is rather common with existing iSeries 400 applications when they are moved to the web.
To make life easier for these people also, we have developed a prototype of application driven protection that they may try and modify at their own will, instead of wasting time in developing their own tool.
Click on the ...more info button above to display the details of this technique.

3.  Download
link to download page
You may download and install these pages on your iSeries 400, along with any documentation, programs, labs, utilities and sources we have on the web protection subject.