Security

Distributed applications accessed through the Internet face the possibility of malicious attacks. This necessitates security arrangements and the setting up of a security system. A security system gives us the power to determine who can and should access resources, such as application modules, servlets, EJBs, and Web pages. It also enables us to define the security policies to establish control of resources.

Before getting access to any service in the application server, a client has to pass two checks: authentication and authorization:

  • Authentication— Is the process of determining whether you are who you say you are.

  • Authorization— Decides if you are allowed to perform the operation you have requested.

In this section, we discuss the ...

Get EJB 2.0 Development with WebSphere Studio Application Developer now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.