The Custom Roles Model
The DD Only security model is probably fine if role mappings are fairly static and developers and administrators work closely together to set up application security. However, in an environment where you need to frequently change role mappings or where developers and administrators work independent of each other, the DD Only security model opens the door to many potential problems, including the need to frequently redeploy the application following a remapping of roles. The Custom Roles security model is better able to handle security in such as environment. Under this model, the developer defines the security policies in the deployment descriptors by mapping the EJBs and URLs to roles in the deployment descriptors. The ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access