Ensure all unprotected 2.x methods have the correct level of protection

Use this page to verify that the unprotected Enterprise JavaBeans™ (EJB) Version 2.x methods have the correct level of protection before you map users to roles.

This administrative console panel is displayed during the application deployment process. To access the administrative console panel, click Applications > New application application_name. The panel is displayed as Ensure all unprotected 2.x methods have the correct level of protection in the application deployment steps. On this administrative console panel, you can specify whether users can access specific EJB modules.

To use this administrative console page, select the Uncheck, Exclude, or Role option, the check box next to the EJB module, and click Apply. If you select Role option, select the appropriate role for the EJB module before you click Apply.

Uncheck

Select this option if you do not want the application server to verify the access permissions for the EJB module. Everyone can access the EJB module.

Default: Selected

Exclude

Select this option to protect this EJB module by making it inaccessible to users regardless of their access permissions.

Default: Deselected

Role

Specifies the EJB level of protection based on the security role.

The roles listed in this menu are obtained from the application scope. If the selected role is not in the module, then it is added to the modules or Java™ archive (JAR) files.

Default: Deselected

EJB module

Specifies the name of the module.

If a module name appears in this list, then the module contains unprotected EJB methods.

URI

Specifies the Uniform Resource Identifier (URI) that is used to locate the Java archive (JAR) file for the EJB module.

Protection type

Specifies the level of protection that is assigned to a particular module name.

After you select the Uncheck, Exclude, or Role option and click Apply, the selected protection option is displayed in this column.




Related tasks
Assigning users and groups to roles
Assigning users to RunAs roles
Reference topic    

Terms of Use | Feedback

Last updated: Oct 21, 2010 10:04:34 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=compass&product=was-nd-mp&topic=usectmethods2
File name: usec_tmethods2.html