6.3 Authentication with security identities
This section describes authentication methods that use security identities.
The table below shows the organization of this section.
|
Part |
Title |
Relevant information |
|---|---|---|
|
Description |
Security identity functionality |
|
|
Implementation |
Security implementation in EJB client applications |
|
|
Setup |
Authentication setup with security identities |
Note: This section does not include information on operation or precautions.