Summary

In this chapter you have learned the following:

  • More about infrastructure front-end security
  • The importance of group-role mapping in fine-tuning access to specific modules within a web enterprise application
  • The locations inside an EAR that contain security data
  • The security application attributes that need to be defined
  • How to build, configure, and package securable EARs
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.255.197