5.6. Run-as mapping
Run-as mapping refers to the process of assigning a real user from the user registry that is a member of the specified security role to the bean-level or method-level delegation policies. Run-as mapping is very different from, but easily confused with, security role mapping. The following table compares these two concepts. |
Run-as Mapping | Security Role Mapping |
---|---|
Run-as mapping is used to determine the principal from the user registry that will be used as the caller identity when a delegated EJB makes calls. | Security role mapping is used to determine the users and groups from ... |
Get IBM WebSphere V5.0 Security: WebSphere Handbook Series now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.