For Remoting Service destinations, you can declare destinations that only allow invocation of methods that are
explicitly included in an include list. Any attempt to invoke a method that is not in the
include-methods list results
in a fault. For even finer grained security, you can assign a security constraint to one or more of the methods in the
include-methods list. If a destination-level security constraint is defined, it is tested first. Following that, the
method-level constraints are checked. For more information, see “Configuring a destination to use a security
constraint” on page 159.
Calling a service ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.