9.1 Organization of this chapter
This chapter describes how to set security roles and J2EE application security by using the server management commands.
The table below shows how the chapter is organized
|
Part |
Title |
Relevant information |
|---|---|---|
|
Setup |
Security role setup |
|
|
Definition of security role references |
||
|
Security definition (method permission) |
||
|
Security definition (security identities) |
Note: This chapter does not include information on description, implementation, operation, or precautions.