6.3 Authentication with security identities
This section describes authentication methods that use security identities.
The table below shows the organization of this section.
Part |
Title |
Relevant information |
---|---|---|
Description |
Security identity functionality |
|
Implementation |
Security implementation in EJB client applications |
|
Setup |
Authentication setup with security identities |