O'Reilly logo

IBM WebSphere V5.0 Security: WebSphere Handbook Series by Stephen Pipes, Rao Maheshwar, David Leigh, Floyd Langley, Piotr Kisielewicz, Paul Creswick, Derek Carpenter, Peter Kovari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

4.6. Additional security guidelines

This section provides some useful information and proivides food for thought about security considerations and issues. We cover the following topics:

  • Security constraints for the Web module

  • Struts security

  • Page expiration

Security constraints for the Web module

There are multiple approaches to setting authorization rules for resources. In this case, we will investigate the possibilities for Web resource protection using Web security constraints in the Web module.

The first approach is to map resources to roles, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required