Geetha Ramaswamy

Subscribe to Geetha Ramaswamy: eMailAlertsEmail Alerts
Get Geetha Ramaswamy: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Geetha Ramaswamy

The J2EE security model provides a built-in security concept based on roles provided by deployment descriptors. The deployment descriptors contain elements that allow us to map users or groups of users to specific roles (this information is used to authenticate the user) - and to specify which roles are allowed access to which resources. All users mapped to a particular role are allowed access to a certain resource. (This information is used to determine if the user is authorized to access the resource or not.) For purposes of discussion, let us consider a simple J2EE application that has a few Web pages and one Enterprise JavaBean (EJB), which is a simple session bean. The J2EE containers that house these two different types of J2EE application components are: 1.  Web container: Houses static HTML pages, servlets, JavaServer Pages, image files such as GIFs, etc.; it... (more)