December 2002
Intermediate to advanced
556 pages
12h 29m
English
![]() | Run-as mapping refers to the process of assigning a real user from the user registry that is a member of the specified security role to the bean-level or method-level delegation policies. Run-as mapping is very different from, but easily confused with, security role mapping. The following table compares these two concepts. |
| Run-as Mapping | Security Role Mapping |
|---|---|
| Run-as mapping is used to determine the principal from the user registry that will be used as the caller identity when a delegated EJB makes calls. | Security role mapping is used to determine the users and groups from ... |
Read now
Unlock full access