uCosminexus Application Server, Security Management Guide
This section describes authentication methods that use security identities.
The table below shows the organization of this section.
Table 6-5 Organization of this section (Authentication with security identities)
| Part | Title | Relevant information |
|---|---|---|
| Description | Security identity functionality | 6.3.1 |
| Implementation | Security implementation in EJB client applications | 6.3.2 |
| Setup | Authentication setup with security identities | 6.3.3 |
Note: This section does not include information on operation or precautions.
All Rights Reserved. Copyright (C) 2013, Hitachi, Ltd