Unprotected EJB 2.0 methods protection settings
Use this page to verify that unprotected EJB 2.0 methods have the
correct level of protection before you map users to roles.
To view this administrative console page, click Application > Install
New Application. While running the Install New Application Wizard, prompts
appear to help you map security roles to users.
- Exclude
- Specifies that the method is completely protected.
Data type: |
Check box |
Default: |
Cleared |
- Uncheck
- Specifies that everyone can access the security method.
Data type: |
Check box |
Default: |
Uncheck |
- Specify role
- Specifies the EJB level of protection based on the security role.
The roles listed in this menu are obtained from the application scope.
If the selected role is not in the module, then it is added to the modules
or Java archive (JAR) files.
Data type: |
String |
Units: |
Role |
- Module name
- Specifies the name of the module.
If a module name appears in this list, then the module contains unprotected
EJB methods.
Data type: |
String |
Units: |
Module name |
- Protection
- Specifies the level of protection assigned to a particular module
name.
Data type: |
String |
Default: |
Cleared |
Searchable topic ID:
usectmethods
Last updated: Jun 21, 2007 8:07:48 PM CDT
WebSphere Business Integration Server Foundation, Version 5.0.2
http://publib.boulder.ibm.com/infocenter/wasinfo/index.jsp?topic=/com.ibm.wasee.doc/info/ee/ae/usec_tmethods.html