Difference between version and version      View first change»»

Back to Web.xml.AuthConstraint, or Web.xml.AuthConstraint version history

At line 5 added 2 lines.
For a user to gain access, they must belong to at least one of the listed roles.
At line 7 changed 1 line.
Each role used in an <auth-constraint> must also be listed in a <[security-role|web.xml.SecurityRole]> section, which lists all the roles used in the application.
If no roles are listed, no user is allowed access to the protected area.
At line 11 added 6 lines.
Users are mapped to Roles in the [Security Realm] itself (for example, a JDBC Authentication Realm).
!Requirements
* Each role used in an <auth-constraint> must also be listed in a <[security-role|web.xml.SecurityRole]> section, which lists all the roles used in the application.
\\
At line 18 added 1 line.
*[web.xml] Reference Page - for a full example of a security constraint
navigation
metawerx specific
search
Share
tools
help

referring pages

Share