This week's book giveaway is in the JavaScript forum.
We're giving away four copies of Cross-Platform Desktop Applications: Using Node, Electron, and NW.js and have Paul Jensen on-line!
See this thread for details.
Win a copy of Cross-Platform Desktop Applications: Using Node, Electron, and NW.js this week in the JavaScript forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic

EJB Security  RSS feed

 
Mark Herschberg
Sheriff
Posts: 6037
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
I'm trying to understand the EJB security model. From what I've read, EJB methods can have restricted access, such that only certain "people" can invoke them. I also know that under the Java 1.2 security model, objects can "impersonate" people.
How exactly, do I have an EJB claim to represent a particular identity? What information do I need to give to the EJB? What then, does the EJB give, and to whom, to prove that it has permission to access a certain method?
Thanks.

--Mark
hershey@vaultus.com
 
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
Boost this thread!