O'Reilly logo

IBM WebSphere® Application Server for Distributed Platforms and z/OS®: An Administrator’s Guide by Alan Beaubien, Yu Tang, Mike Casile, Michel Betancourt, Thomas Gissel, Mihaela Herescu, Dipak Patel, Keith McGuinnes, Radhike Iyer, Kyle Miller, Dave Draeger, Mike Everett, Ann Black

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16. Securing Applications in WebSphere

Objectives

This chapter covers the following concepts:

  • How to secure Web components in your application

  • How to secure EJB components in your application

  • How to use the Application Assembly Tool and the Application Server Toolkit to define security roles and references

  • How to manage secure applications after deployment

This chapter discusses how to configure a secured application. A secured application is an application that takes advantage of the Java 2 and J2EE security specifications. This means that a secured application has defined users and roles to isolate unauthorized users from specific methods or segments of code. An application, however, does not have to incorporate the Java 2 Security API; that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required