O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Declarative Security Example

To illustrate declarative security, we modify our last example, Example ch10-ex2. The modified example is labeled Example ch10-ex3, and its sources can be found in the directory tree rooted at src\jsbook\ch10\ex3 in the JSTK installation.

This example has a gateway bean EchoGW, in addition to the client program and the echo server bean Echo. This bean acts as a gateway between the client program and Echo bean, acting as the target bean for the client and a client to the Echo bean. This gives us the opportunity to talk about and demonstrate identity propagation and delegation concepts. To realize this scenario, the sources of the client and the server beans have been modified.

Overview of the Example

In this example, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required