Skip to Main Content
J2EE™ Tutorial, The
book

J2EE™ Tutorial, The

by Stephanie Bodoff, Dale Green, Kim Haase, Eric Jendrock, Monica Pawlan, Beth Stearns
March 2002
Beginner to intermediate content levelBeginner to intermediate
528 pages
10h 12m
English
Addison-Wesley Professional
Content preview from J2EE™ Tutorial, The

Web-Tier Security

The following sections address protecting resources and authenticating users in the Web tier.

Protecting Web Resources

You can protect Web resources by specifying a security constraint. A security constraint determines who is authorized to access a Web resource collection, which is a list of URL patterns and HTTP methods that describe a set of resources to be protected. Security constraints can be defined using deploytool, as described in Controlling Access to Web Resources (page 338).

If you try to access a protected Web resource as an unauthenticated user, the Web container will try to authenticate you. The container will only accept the request after you have proven your identity to the container and have been granted permission ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The J2EE™ Tutorial Second Edition

The J2EE™ Tutorial Second Edition

Stephanie Bodoff, Eric Armstrong, Jennifer Ball, Debbie Bode Carson, Ian Evans, Dale Green, Kim Haase, Eric Jendrock
Sams Teach Yourself J2EE™ in 21 Days

Sams Teach Yourself J2EE™ in 21 Days

Martin Bond, Dan Haywood, Debbie Law, Andy Longshaw, Peter Roxburgh
Sams Teach Yourself J2EE™ in 21 Days, Second Edition

Sams Teach Yourself J2EE™ in 21 Days, Second Edition

Martin Bond, Dan Haywood, Debbie Law, Andy Longshaw, Peter Roxburgh

Publisher Resources

ISBN: 0201791684Purchase book