© Arjan Tijms, Teo Bais, and Werner Keil 2022
A. Tijms et al.The Definitive Guide to Security in Jakarta EEhttps://doi.org/10.1007/978-1-4842-7945-8_4

4. Jakarta Authorization

Arjan Tijms1  , Teo Bais2 and Werner Keil3
(1)
AMSTERDAM, Noord-Holland, The Netherlands
(2)
Utrecht, Utrecht, The Netherlands
(3)
Bad Homburg vdH, Hessen, Germany
 

In the previous chapter, we looked at Jakarta Authentication, which was about proving you are who you say you are. We also learned that authorization is about granting permissions to (mostly) someone who is authenticated. Authorization is handled in Jakarta EE by Jakarta Authorization. Like Jakarta Authentication, Jakarta Authorization is a lower-level API and as such the underpinning of higher-level APIs in the Jakarta ...

Get The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.