uCosminexus Application Server, Security Management Guide
This chapter describes how to set security roles and J2EE application security by using the server management commands.
The table below shows how the chapter is organized
Table 9-1 Organization of this chapter (Server management command-based security role and application setup)
| Part | Title | Relevant information |
|---|---|---|
| Setup | Security role setup | 9.2 |
| Definition of security role references | 9.3 | |
| Security definition (method permission) | 9.4 | |
| Security definition (security identities) | 9.5 |
Note: This chapter does not include information on implementation, operation, or precautions.
All Rights Reserved. Copyright (C) 2013, Hitachi, Ltd