O'Reilly logo

Applied Enterprise JavaBeans™ Technology by Kevin Boone

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

16.2. J2EE/EJB security architecture

This section describes how the J2EE/EJB security model realizes the security features discussed above. Because the EJB security model is a subset of the J2EE model, it seems sensible to consider the basic principles of both together. EJB-specific matters are described in detail in a later section.

16.2.1. Overview

For the purposes of this chapter, I have divided the security model into three ‘layers’ (Figure 16.1).

Figure 16.1. A simplified view of the J2EE security architecture. See text for details.

EJB/Web tier security models

As we shall see, the EJB developer expresses the security needs of the application ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required