6.2 Web container-based authentication using DD settings
Role-based authentication processes are handled by a Web container. Each user is given one or more roles for user management. The roles are configured using the <security-constraint> tag within the DD file (WEB-INF/web.xml) included in a J2EE application. For details about how to configure the J2EE application, see 6.2.2 Definitions in DD files.
Using a Web application, you can define the roles necessary for access to each particular URL within the context. When a Web client requests access to a restricted URL, the authentication process involves two steps:
-
Determining whether the access request to be authenticated is from a valid user
-
Determining whether the roles given to the user match those required for access
Only a user who is recognized as valid in both steps can access the restricted URL.
The table below shows the organization of this section.
Part |
Title |
Relevant information |
---|---|---|
Description |
Web container-based authentication functionality using DD settings |
|
Implementation |
Definitions in DD files |
|
Setup |
Setup in an execution environment (J2EE application setup) |
|
Precautions |
Precautions for using authentication functionalities |