|
This tutorial describes how to create the users, groups, and global security roles that are required by the MedRec application.
After you finish this tutorial, you will be able to log in to all three MedRec Web applications as the appropriate type of user (administrator, patient, or physician) and start using the application.
Before starting this tutorial:
MedRecDomain and MedRecServer, and start MedRecServer. See Tutorial 1: Creating a WebLogic Domain and Server Instance for Development.MedRecEar. See Tutorial 15: Using WLST and the Administration Console to Deploy the MedRec Package for Production.
To create the required users, groups, and security roles using the Administration Console:
MedRecServer running, open the Administration Console by navigating in a browser to:http://host:7101/console
where host refers to the computer on which MedRecServer is running. If your browser is on the same computer as MedRecServer, you can use the URL http://localhost:7101/console.
weblogic for both the username and password and click Log In.
Security Realms. myrealm.
General tab.All Web Applications and EJBs.This setting means that the WebLogic Security Service will perform security checks on all URL (Web) and EJB resources. For more information, see Understanding How to Check Security Roles and Security Policies in Securing WebLogic Resources.
Ignore Roles and Policies From DD. This setting indicates that you will set security for Web Application and EJB resources in the Administration Console, not in deployment descriptors. For more information, see Understanding the On Future Redeploys Setting in Securing WebLogic Resources.
MedRecServer. (See
Starting and Stopping Servers: Quick Reference in Managing Server Startup and Shutdown.)
Security Realms. myrealm.
Groups tab. The Groups table displays all groups currently defined in the WebLogic Authentication provider's database.
MedRecAdmins.MedRecAdmins can log on to the MedRec Administrators Web site.DefaultAuthenticator (default value).MedRecPatients, with a description of MedRecPatients can log on to the MedRec Patients Web site, and DefaultAuthenticator provider.MedRecPhysicians, with a description of MedRecPhysicians can log on to the MedRec Physician Web site, and DefaultAuthenticator provider.
Security Realms. myrealm.
Users tab. The Users table displays all users currently defined in the WebLogic Authentication provider’s database.
admin@avitek.com.MedRec administrator.DefaultAuthenticator (default value).weblogic.admin@avitek.com.MedRecAdmins group.MedRecAdmins group from the Available to the Chosen choice box.mary@md.com, a MedRec physician who also uses the weblogic password and the DefaultAuthenticator provider, and belongs in the MedRecPhysicians group.larry@bball.com, a MedRec patient who also uses the weblogic password and the DefaultAuthenticator provider, and belongs in the MedRecPatients group.medrec_webservice_user, a MedRec Web Service User who also uses the weblogic password and the DefaultAuthenticator provider, and belongs in the MedRecPhysicians group.myrealm security realm to confirm that the three users have been added.
Security Realms. myrealm.
Realm Roles tab. The Roles table displays all global and scoped roles currently defined in the WebLogic Role Mapping provider's database.
The Global Roles table displays all global roles currently defined in the WebLogic Role Mapping provider's database.
MedRecAdmin.
Leave the Provider Name field to the default value: XACMLRoleMapper.
MedRecAdmin.Group for the Predicate List.MedRecAdmins.The Role Conditions table includes the following entry:
Group MedRecAdminsMedRecPatient and to grant this global role to the MedRecPatients group.MedRecPhysician and to grant this global role to the MedRecPhysicians group.Now that you have created all the required users, groups, and roles, you can actually log in to the various MedRec Web applications and start using them. First navigate to the following start page in a browser:
http://host:7101/start.jsp
In the preceding URL, host refers to the computer that hosts MedRecServer. If your browser is on the same computer as MedRecServer, you can use localhost; for example: http://localhost:7101/start.jsp.
The main MedRec application page appears. Click on the links to log in in to the different Web applications, using the following username/passwords:
Nmtoken in the
Extensible Markup Language (XML) recommendation. The BEA convention is that group names are plural, and security role names are singular.Group role condition. Individual users could also be granted a security role, but this is a less typical practice.
The MedRec application has been coded such that only certain roles are allowed to access certain modules, in particular login to Web Applications such as patient, physician, and admin. This tutorial showed you first how to create groups to represent patients, administrators, and physicians, then how to create individual users and assign them to a particular group, and finally, how to map a group to a role. Once this security configuration is in place, you can log in to the applications using the appropriate user.
You might have noticed, however, that in Step 3: Create users and add the users to groups., you did not create an actual patient user. This is because patients, along with their personal information, are stored in the PointBase database and are authenticated using a Custom DBMS Authenticator. The database also stores the group to which the user is assigned. You must, however, use the Administration Console to create the MedRecPatients group and the MedRecPatient role, and then map the group to the role.
The next tutorials show how to secure specific resources, such as Web applications and EJBs.
|