Previous Step   Previous Step

Administer the secure JAX-RS application.

Map Step 7 towards the goal: Implementing secure JAX-RS applications

About this task

After you have implemented security mechanisms such as basic HTTP authentication or role-based authorization constraints on your REST resources, you can use the administrative console to administer your JAX-RS applications by mapping defined roles to users, groups, or special subjects.

Before you begin

Deploy JAX-RS Web applications.

Supporting information (generally applicable)

Previous Step   Previous Step


Terms and conditions for information centers | Feedback

Last updated: Sep 6, 2012 5:49:43 AM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=v610webmob&product=was-nd-mp&topic=twbs_jaxrs_impl_securejaxrs_step7
File name: twbs_jaxrs_impl_securejaxrs_step7.html