O'Reilly logo

JBoss in Action: Configuring the JBoss Application Server by Peter Johnson, Javid Jamae

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Securing web applications

This chapter covers

  • Configuring web security
  • Web authentication
  • Web authorization
  • Encrypted web communication

While working on different projects, we’ve seen project teams spend a lot of time writing custom authentication and authorization code. But this code functions in much the same way as the security model defined by the Java EE specification. In many cases, you don’t have to write custom security code for every new web application you write; the standard web security features of Java EE can obviate writing security code altogether, allowing you to add security to your application entirely through configuration.

In chapter 4, we talked about the fundamentals of JBoss security and showed you how ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required