Securing web applications
In this chapter, we describe how to secure web applications that are running in a CICS Liberty JVM server. You learn how to configure Liberty with your preferred security provider, and the various ways you can request credentials from users.
Specifically, we describe the different registry types that are available to Liberty in CICS, along with some of the more popular methods of authentication and authorization.
This chapter includes the following topics: