WSO2 Developer Studio is now integrated into WSO2 products as a Tooling solution, providing you with an enhanced development experience. For more information, see the respective documentation of the product.
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Applying security for services is vital since it creates high quality services in terms of non functional attributes like reliability. It supports highly available deployments, horizontal scaling via clustering with stateless server architecture, dynamic discovery of services using WS-Discovery, lazy loading via ghost deployers and Apache Zookeeper based coordination support.

The steps below demonstrate how to create a security policy, how to apply security for a service via Developer Studio, and then deploy it in the server.

Creating the security policy

  1. Open the Developer Studio Dashboard (click Developer Studio > Open Dashboard) and click Registry Resource.


     
  2. Select the From existing template option and click Next.  
  3. Enter a resource name and select the WS-Policy template along with the preferred registry path.


     
  4. Click Finish
  5. Open the created policy by double-clicking on the created policy file.


     
  6. The policy file opens in a multi page editor with a Security Form Editor as the design view and an XML editor as the source view.

    Design View



    Source View


     
  7. Enable security by specifying the required scenario in the Security Form Editor. Click the icon next to each scenario for more information.


     
  8. You can provide service information as private store and advanced configuration information as rampart configuration.




     
  9. For certain scenarios, you can specify user roles. After you select the scenario, scroll to the right to see the User Roles button. Alternatively, maximize the window. 


     
  10. Either define the user roles inline or retrieve the user roles from the server.

    Define Inline



    Get from the server


     
  11. Create a Composite Application project including the created policy file and then create a CAR file to deploy to the server.

Applying security for a proxy service

  1. Once you have configured the policy file, you can apply security for a proxy service by setting the Security Enabled property to true and pointing to the policy key under Service Policies in the proxy properties.




     
  2. Specify the policy path inline or browse from the registry or workspace. You can also create and point to a new resource.


     

By default, the role names are not case sensitive. If you want to make them case sensitive, add the following property under the <AuthorizationManager> configuration in the user-mgt.xml file:

<Property name="CaseSensitiveAuthorizationRules">true</Property>

 

Applying security for a data service

Once you have configured the policy file, you can apply security for a data service by setting the Enable Security property to true and pointing to the policy key in the Policy property in the data services properties.


Applying security for a BPEL workflow

  1. Once you have configured the policy file, you can apply security for a BPEL workflow by right-clicking the BPEL project and clicking Apply Security.
  2. On the wizard that appears, select the process and browse to the policy file from the registry.



  3. Click Finish.
  • No labels