4.6. Additional security guidelines
This section provides some useful information and proivides food for thought about security considerations and issues. We cover the following topics:
Security constraints for the Web module
Struts security
Page expiration
Security constraints for the Web module
There are multiple approaches to setting authorization rules for resources. In this case, we will investigate the possibilities for Web resource protection using Web security constraints in the Web module. |
The first approach is to map resources to roles, ... |
Get IBM WebSphere V5.0 Security: WebSphere Handbook Series now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.