O'Reilly logo

IBM WebSphere V5.0 Security: WebSphere Handbook Series by Stephen Pipes, Rao Maheshwar, David Leigh, Floyd Langley, Piotr Kisielewicz, Paul Creswick, Derek Carpenter, Peter Kovari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5.4. Security role references

Security role references are used to provide a layer of indirection between security roles named in EJB Java code and security roles that are defined at application assembly time. This allows security roles names to be modified without requiring changes in the application code.

When an EJB uses the IsCallerInRole(Java.lang.String roleName) J2EE API method to determine whether or not the caller is a member of a particular role, roleName is a security role reference which is later linked to a defined security role in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required