Security
In the Security tabbed pane, you can define how the client
authenticates users to the server and which users have access
to a particular resource.
Choose the Authentication Method
- From the Authentication method menu, choose one of these
methods:
- If you chose Basic or Form authentication, click Settings to
choose the realm name or the login page and error page.
Define Security Constraints
In the Security Constraints section of the screen, define the
for your WAR file.
- Click the Add button adjacent to the Security Constraints field.
- With the security constraint selected, click the Add button in the
Web Resource Collections pane to add a
to the security constraint.
- Enter the name of the web resource collection in the Web Resource
Collections field.
- Click Edit to add resources to the web resource collection.
- Select the GET or POST checkbox to specify the HTTP methods that
can be called on these resources. You must select at least one of the HTTP
methods.
- From the Network Security requirement menu, select the
- In the Authorized Roles pane, click Edit to define the
for this security constraint.
Copyright 1999-2001 Sun
Microsystems,
Inc. All Rights Reserved.