Before you begin
Before you perform this task, you already completed the steps in Securing Web applications using an assembly tool and Securing enterprise bean applications where you created new roles and assigned those roles to enterprise bean and Web resources. Complete these steps during application installation. The environment user registry under which the application is running is not known until deployment.Why and when to perform this task
If you already know the environment in which the application is running and the user registry that is used, you can use an assembly tool to assign users and groups to roles. Using the administrative console to assign users and groups to roles is recommended.Steps for this task
Result
The ibm-application-bnd.xmi file in the application contains the users and groups-to-roles mapping table, which is theauthorization table.What to do next
After securing an application, install the application using the administrative console.Related concepts
Web component security
Role-based authorization
Related tasks
Assembling applications
Related reference
Security: Resources for learning