In this chapter you have learned the following:
- More about infrastructure front-end security
- The importance of group-role mapping in fine-tuning access to specific modules within a web enterprise application
- The locations inside an EAR that contain security data
- The security application attributes that need to be defined
- How to build, configure, and package securable EARs
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.