O'Reilly logo

IBM WebSphere V5.0 Security: WebSphere Handbook Series by Stephen Pipes, Rao Maheshwar, David Leigh, Floyd Langley, Piotr Kisielewicz, Paul Creswick, Derek Carpenter, Peter Kovari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

4.5. Login facilities

The J2EE Specification defines the following types of authentication methods.

  • Basic authentication

  • Digest authentication

  • Form based authentication

  • Client Certificate based authentication

For a brief description of each type of authentication, see 4.2.1, “Configuring Web module security” on page 46.

For any type of authentication methods to work, at least one security constraint should be defined for the requested Web resources and Global Security must be enabled for the application server.

For instructions on how to define security constraints for Web resources, see 4.2.1, “Configuring Web module security” on page 46.

For instructions on how to enable Global Security on the server, please refer to 10.2, “WebSphere Global Security” ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required