O'Reilly logo

IBM WebSphere V5.0 Security: WebSphere Handbook Series by Stephen Pipes, Rao Maheshwar, David Leigh, Floyd Langley, Piotr Kisielewicz, Paul Creswick, Derek Carpenter, Peter Kovari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

3.5. J2EE application security configuration

There are two aspects of application security administration which apply to all secured J2EE application components: defining security roles (performed at application assembly time), and security role mapping (performed at deployment time). Additional application security administration tasks which apply to specific J2EE components will be discussed in later chapters.

Defining security roles can be performed using either of two WebSphere tools:

  • Application Assembly Tool

  • WebSphere Studio Application Developer

Security role mapping can be performed using either of the above tools, or can be performed using the WebSphere Administrative Console as part of the application installation.

The following sections ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required