Win a copy of The Business Blockchain this week in the Cloud forum!
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

http-method

 
Surajsingh Thakur
Ranch Hand
Posts: 124
Eclipse IDE MySQL Database Tomcat Server
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
I wish to know , when no http-method is specified in security-constraint
then All the methods are Contrained that is restricted to be used by only the roles in auth-constraint element..It also means that no user who is not in auth-constraint can access any constrained resourse using any method..
How far is this Correct
 
Seetharaman Venkatasamy
Ranch Hand
Posts: 5575
Eclipse IDE Java Windows XP
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hi buddy suraj,

i did small R&D, and i found that




is equal to




Hope This Helps
 
Rafael Durelli
Greenhorn
Posts: 7
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
very thanks guy
 
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic