4.6. Additional security guidelines

This section provides some useful information and proivides food for thought about security considerations and issues. We cover the following topics:

  • Security constraints for the Web module

  • Struts security

  • Page expiration

Security constraints for the Web module

There are multiple approaches to setting authorization rules for resources. In this case, we will investigate the possibilities for Web resource protection using Web security constraints in the Web module.

The first approach is to map resources to roles, ...

Get IBM WebSphere V5.0 Security: WebSphere Handbook Series now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.