Summary

This chapter covered some of the authentication techniques that you can use for protecting your Web resources:

  • Server authentication

  • Custom authorization

  • Custom form-based authorization

The next chapter will look at personalizing and customizing AuctionStation.

Get Java Server Pages from scratch now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.