Hitachi

uCosminexus Application Server Security Management Guide


9.1 Organization of this chapter

This chapter describes how to set security roles and J2EE application security by using the server management commands.

The table below shows how the chapter is organized

Table 9‒1: Organization of this chapter (Server management command-based security role and application setup)

Part

Title

Relevant information

Setup

Security role setup

9.2

Definition of security role references

9.3

Security definition (method permission)

9.4

Security definition (security identities)

9.5

Note: This chapter does not include information on description, implementation, operation, or precautions.