Declarative Security Example
To illustrate declarative security, we modify our last example, Example ch10-ex2. The modified example is labeled Example ch10-ex3, and its sources can be found in the directory tree rooted at src\jsbook\ch10\ex3 in the JSTK installation.
This example has a gateway bean EchoGW, in addition to the client program and the echo server bean Echo. This bean acts as a gateway between the client program and Echo bean, acting as the target bean for the client and a client to the Echo bean. This gives us the opportunity to talk about and demonstrate identity propagation and delegation concepts. To realize this scenario, the sources of the client and the server beans have been modified.
Overview of the Example
In this example, ...
Get J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.