|
Exploiting J2SE Security (1/4)
- How can J2SE mechanisms perform
container-based authentication / authorization ?
- JAAS login modules perform principal
authentication
- JAAS principal created
- Maps authenticated principal to EJB role(s)
- EJB method authorization is based on
permission for an EJB role
|
copyright © 2014 - all rights riserved by javatechnologycenter.com