© Arjan Tijms, Teo Bais, and Werner Keil 2022
A. Tijms et al.The Definitive Guide to Security in Jakarta EEhttps://doi.org/10.1007/978-1-4842-7945-8_5

5. Jakarta Security

Arjan Tijms1  , Teo Bais2 and Werner Keil3
(1)
AMSTERDAM, Noord-Holland, The Netherlands
(2)
Utrecht, Utrecht, The Netherlands
(3)
Bad Homburg vdH, Hessen, Germany
 

The previous two chapters dealt with Jakarta Authentication and Jakarta Authorization, which are the low-level APIs and SPIs on which the higher-level security functionality is built. In this chapter, we’ll take a look at Jakarta Security, which is the regular application developer facing part of security in Jakarta EE. Practically oriented readers can focus on this chapter and take a peek if needed for some of the underlying ...

Get The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.