• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Ron McLeod
  • Rob Spoor
  • Tim Cooke
  • Junilu Lacar
Sheriffs:
  • Henry Wong
  • Liutauras Vilda
  • Jeanne Boyarsky
Saloon Keepers:
  • Jesse Silverman
  • Tim Holloway
  • Stephan van Hulst
  • Tim Moores
  • Carey Brown
Bartenders:
  • Al Hobbs
  • Mikalai Zaikin
  • Piet Souris

doubt in auth-constraint

 
Ranch Hand
Posts: 113
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
which option is valid?
A)

<auth-constraint>
<role-name>Bob</role-name>
</auth-constraint>
<auth-constraint>
<role-name>Alice</role-name>
</auth-constraint>


B)
<auth-constraint>
<role-name>Bob</role-name>
<role-name>Alice</role-name>
</auth-constraint>
 
Ranch Hand
Posts: 32
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
B.In a <security-constraint> tag, only one <auth-constraint> is allowed. It can have multiple roles.
 
V Gala
Ranch Hand
Posts: 113
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
But in errata page they have made changes like option a (page 662)
 
Sheriff
Posts: 14691
16
Eclipse IDE VI Editor Ubuntu
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

But in errata page they have made changes like option a (page 662)


Is option "a" given as a right answer in the book ? (it's not written in the errata)
[ April 09, 2008: Message edited by: Christophe Verre ]
 
Reesha Ashok
Ranch Hand
Posts: 32
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

Originally posted by V Gala:
But in errata page they have made changes like option a (page 662)



Errata in page 662 doesn't mention about the answer options. It's about the question. It mentions the code was given in a wrong way. The auth-constraint elements which had 'Bob' and 'Alice' didn't have the <role-name> tag inside the <auth-constraint> which was corrected in the errata.
In the question it's mentioned that each of these <auth-constraint> tags belong to three valid <security-constraint> elements in a deployment descriptor.
 
V Gala
Ranch Hand
Posts: 113
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
thanks
I got it
 
You showed up just in time for the waffles! And this tiny ad:
Building a Better World in your Backyard by Paul Wheaton and Shawn Klassen-Koop
https://coderanch.com/wiki/718759/books/Building-World-Backyard-Paul-Wheaton
reply
    Bookmark Topic Watch Topic
  • New Topic