Security constraint assembly settings
Use the Security constraints panel to configure security constraints.
To view this Application Assembly Tool (AAT) panel, open an existing or
create a new Web module. Right-click Security Constraints from the
left navigation menu. Click New.
If multiple security constraints are specified, the container uses the
"first match wins" rule when processing a request to determine what authentication
method to use, or what authorization to allow
- Security constraint name
- Specifies the name of the security constraint.
- Authorization Constraints - Roles
- Specifies the user roles that are permitted access to this resource
collection.
- Authorization Constraints - Description
- Contains a description of the authorization constraints
- User Data Constraints - Transport guarantee
- Indicates how data communicated between the client and the server
is to be protected.
Specifies that the protection for communications between the client and
server is None, Integral, or Confidential.
- None means that the application does not require any transport guarantees.
- Integral means that the application requires that the data sent between
the client and the server must be sent in such a way that it cannot be changed
in transit.
- Confidential means that the application requires that the data must be
transmitted in a way that prevents other entities from observing the contents
of the transmission.
In most cases, Integral or Confidential indicates that the use of SSL is
required.
- User Data Constraints - Description
- Contains a description of the user data constraints.
Searchable topic ID:
usecssec
Last updated: Jun 21, 2007 9:56:50 PM CDT
WebSphere Application Server for z/OS, Version 5.0.2
http://publib.boulder.ibm.com/infocenter/wasinfo/index.jsp?topic=/com.ibm.websphere.zseries.doc/info/zseries/ae/usec_ssec.html