3.4. Application deployment descriptor

Note

This section contains information about deployment descriptor elements which pertain to all J2EE components. Descriptions and examples of the deployment descriptor elements which pertain to specific J2EE Components can be found in Chapter 4, “Securing Web components” on page 37, and in Chapter 5, “Securing EJBs” on page 73.

There are two deployment descriptor files used for security role mapping:

Table 3-1. Role mappings in deployment descriptors
File NamePurposeMandatory?
application.xmlSecurity Roles DefinedYes.
ibm-application-bnd.xmiSecurity Roles MappedNo. Security Roles can be mapped during or after ...

Get IBM WebSphere V5.0 Security: WebSphere Handbook Series now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.