Security constraint assembly settings

Use the Security constraints panel to configure security constraints.

To view this Application Assembly Tool (AAT) panel, open an existing or create a new Web module. Right-click Security Constraints from the left navigation menu. Click New.

If multiple security constraints are specified, the container uses the "first match wins" rule when processing a request to determine what authentication method to use, or what authorization to allow

Security constraint name
Specifies the name of the security constraint.
Data type String
Authorization Constraints - Roles
Specifies the user roles that are permitted access to this resource collection.
Data type String
Authorization Constraints - Description
Contains a description of the authorization constraints
Data type String
User Data Constraints - Transport guarantee
Indicates how data communicated between the client and the server is to be protected.

Specifies that the protection for communications between the client and server is None, Integral, or Confidential.

In most cases, Integral or Confidential indicates that the use of SSL is required.

Data type String
User Data Constraints - Description
Contains a description of the user data constraints.
Data type String



Searchable topic ID:   usecssec
Last updated: Jun 21, 2007 4:55:42 PM CDT    WebSphere Application Server Network Deployment, Version 5.0.2
http://publib.boulder.ibm.com/infocenter/wasinfo/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/usec_ssec.html

Library | Support | Terms of Use | Feedback