This section provides some useful information and proivides food for thought about security considerations and issues. We cover the following topics:
Security constraints for the Web module
There are multiple approaches to setting authorization rules for resources. In this case, we will investigate the possibilities for Web resource protection using Web security constraints in the Web module.
The first approach is to map resources to roles, ...