Hitachi

uCosminexus Application Server Security Management Guide


6.3 Authentication with security identities

This section describes authentication methods that use security identities.

The table below shows the organization of this section.

Table 6‒5: Organization of this section (Authentication with security identities)

Part

Title

Relevant information

Description

Security identity functionality

6.3.1

Implementation

Security implementation in EJB client applications

6.3.2

Setup

Authentication setup with security identities

6.3.3

Note: This section does not include information on operation or precautions.

Organization of this section