Previous Step   Previous Step

Administer the secure JAX-RS application.

Map Step 10 towards the goal: Implementing secure JAX-RS applications

About this task

After you have implemented security mechanisms such as basic HTTP authentication or role-based authorization constraints on your REST resources, you can use the administrative console to administer your JAX-RS applications by mapping defined roles to users, groups, or special subjects.

Before you begin

Deploy JAX-RS web applications.

Supporting information (generally applicable)

Previous Step   Previous Step


Terms and conditions for information centers | Feedback

Last updated: Jan 30, 2014 9:11:38 AM CST
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=matt&product=was-nd-iseries&topic=twbs_jaxrs_impl_securejaxrs_step10
File name: twbs_jaxrs_impl_securejaxrs_step10.html