5.6. Run-as mapping

Run-as mapping refers to the process of assigning a real user from the user registry that is a member of the specified security role to the bean-level or method-level delegation policies. Run-as mapping is very different from, but easily confused with, security role mapping. The following table compares these two concepts.

Table 5-1. Run-as Mapping versus Security Role Mapping
Run-as MappingSecurity Role Mapping
Run-as mapping is used to determine the principal from the user registry that will be used as the caller identity when a delegated EJB makes calls.Security role mapping is used to determine the users and groups from ...

Get IBM WebSphere V5.0 Security: WebSphere Handbook Series now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.