O'Reilly logo

IBM WebSphere V5.0 Security: WebSphere Handbook Series by Stephen Pipes, Rao Maheshwar, David Leigh, Floyd Langley, Piotr Kisielewicz, Paul Creswick, Derek Carpenter, Peter Kovari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

4.4. Security role reference

During the development phase of the application, the actual role names for security constraints may not be known to the groups of developers. On the other hand, the actual role names in a deployed runtime environment may not be known until the Web application and EJB modules are ready and assembled into the .ear file. Therefore, the role names used during development are considered to be “logical roles”. These logical roles are then mapped by the application deployer into the actual runtime roles during the application ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required