December 2002
Intermediate to advanced
556 pages
12h 29m
English
Note
![]() | This section contains information about deployment descriptor elements which pertain to all J2EE components. Descriptions and examples of the deployment descriptor elements which pertain to specific J2EE Components can be found in Chapter 4, “Securing Web components” on page 37, and in Chapter 5, “Securing EJBs” on page 73. |
There are two deployment descriptor files used for security role mapping:
| File Name | Purpose | Mandatory? |
|---|---|---|
| application.xml | Security Roles Defined | Yes. |
| ibm-application-bnd.xmi | Security Roles Mapped | No. Security Roles can be mapped during or after ... |
Read now
Unlock full access