Previous Step   Previous Step Next Step   Next Step

(optional) Secure downstream JAX-RS resources.

Map Step 6 towards the goal: Implementing secure JAX-RS applications

About this task

You can secure downstream JAX-RS resources by configuring the BasicAuth method for authentication and by using the LTPA JAX-RS security handler to take advantage of single sign-on for user authentication.

Before you begin

Secure JAX-RS resources using annotations.

Supporting information (generally applicable)

What to do next

(optional) Secure JAX-RS clients using SSL.

Previous Step   Previous Step Next Step   Next Step


Terms of Use | Feedback

Last updated: Sep 19, 2011 3:06:41 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=matt&product=was-nd-zos&topic=twbs_jaxrs_impl_securejaxrs_step6
File name: twbs_jaxrs_impl_securejaxrs_step6.html