uCosminexus Application Server, Security Management Guide
The table below shows the types of authentication functionality. Select the functionality that best suits the purpose of your system. For functional details, see the relevant information.
Table 1-2 Authentication functionality and associated system purposes
| Functionality | System purpose | Compliance with Java EE standard | Relevant information | |||||
|---|---|---|---|---|---|---|---|---|
| Rel. | Per. | Op. and maint. | Expand | Other | Std. | Extd. | ||
| Integrated user management | S | -- | S | -- | -- | S | S | Chapter 5 |
| Authentication by application setup | S | -- | -- | -- | -- | S | S | Chapter 6 |
Note: An S entered (in the same row) in both the Standard and Extended columns below Compliance with Java EE standard indicates cases where Java EE functionality has been extended to create functionality that is unique to the application server. An S entered in the Extended column next to a blank Standard column indicates cases where another functionality has been extended to create functionality that is unique to the application server.
All Rights Reserved. Copyright (C) 2013, Hitachi, Ltd