uCosminexus Application Server, Security Management Guide
To manage security by using security identities, user and role information must be registered using a server management command. The table below shows how to set up J2EE applications for authentication with security identities and for utilization of the Run As functionality.
Table 6-6 J2EE application setup for authentication with security identities and for utilization of the Run As functionality
| Functionality | Item | Target to be set | Setting |
|---|---|---|---|
| Authentication with security identities | Specifying whether to perform authentication that uses security identities | Session bean, entity bean, or message-driven bean |
Using the <security-identity> tag in the session bean, entity bean, or message-driven bean attributes file, specify whether to perform authentication. |
| Run As functionality | Specifying whether to use Run As functionality | Using the <run-as> tag in the session bean, entity bean, or message-driven bean attributes file, specify whether to use the Run As functionality. | |
| Specifying the security role name for Run As functionality | Using the <role-name> tag in the session bean, entity bean, or message-driven bean attributes file, specify the security role name. | ||
| Specifying the principal name for Run As functionality | Using the <user-name> tag in the session bean, entity bean, or message-driven bean attributes file, specify the principal name. |
To set up security identities, see 9.5 Security definitions (security identities).
All Rights Reserved. Copyright (C) 2013, Hitachi, Ltd