You can define
and add security constraints on the REST
resources using the same tooling that is used to assemble REST applications.
These constraints are captured in the J2EE web deployment descriptor
that is associated with your application. The following list describes
security definitions that you can include in the deployment descriptor:
- User authentication when invoking REST resources embodied in the
application, including
- HTTP basic authentication
- Form
login authentication
- Authorization control over
REST resources as defined by the URL
patterns for the resources
- Use of SSL for transport when invoking
REST resources
- Programmatic use of the SecurityContext object
to determine user
identity and roles
All the security mechanisms supported
by the web container are
applicable to REST resources, including the use of the Kerberos-based
SPNEGO authentication mechanism.