Chapter 5. Security

Map users and groups to roles

Security roles

The J2EE specification defines a security role as: "A logical groupings of users that are defined by an Application Component Provider or Assembler". Security roles provide a mechanism whereby application developers determine the security policies for an application by creating named sets of users (for example: managers, customers, employees, and so on) which will have access to secure resources and methods. At application assembly time, these sets of users, or security roles, are not tied to any real users or groups of users. Instead, they are placeholders which are later mapped to real users and groups at application deployment time, during a process called security role mapping.

Security roles

BOOT.BY - Tech Industry News         Free SCBCD 1.3 Study Guide     Free SCDJWS 1.4 Study Guide     SCDJWS 1.4 Quiz     Free IBM Certified Associate Developer Study Guide     Free SCJP 5.0 (Tiger) Study Guide     Free Mock Exam Engine     Free SCWCD 1.4 Study Guide     IBM Test 000-287. Enterprise Application Development with IBM WebSphere Studio, V5.0 Study Guide     Free SCBCD 5.0 Study Guide