I have searched HFS&J and
Mikalai Zaikin's Notes and still don't understand this concept. Maybe the answer is there and I just missed it but:
Is the <role-name> element in <auth-constraint> related to the <role-name>
element in <security-role> ?
Edited to include a code example:
Thanks
[ October 15, 2006: Message edited by: Rick Roberts ]