Previous Step   Previous Step Next Step   Next Step

Secure JAX-RS applications within the web container.

Map Step 4 towards the goal: Implementing secure JAX-RS applications

About this task

Using the security services available to the web container, you can secure REST resources by configuring security mechanisms that define user authentication, transport security, authorization control, and user to role mappings.

Before you begin

Configure the JAX-RS application.

Supporting information (generally applicable)

What to do next

Secure JAX-RS resources using annotations.

Previous Step   Previous Step Next Step   Next Step


Terms of Use | Feedback

Last updated: Sep 19, 2011 6:13:59 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=matt&product=was-express-dist&topic=twbs_jaxrs_impl_securejaxrs_step4
File name: twbs_jaxrs_impl_securejaxrs_step4.html