(optional) Secure downstream JAX-RS resources.

Before you begin

Secure JAX-RS resources using annotations.

About this task

Step 6 towards the goal: Implementing secure JAX-RS applications

Procedure

You can secure downstream JAX-RS resources by configuring the BasicAuth method for authentication and by using the LTPA JAX-RS security handler to take advantage of single sign-on for user authentication.

What to do next

(optional) Secure JAX-RS clients using SSL.
Task topic    

Terms and conditions for information centers | Feedback

Last updated: April 17, 2014 04:48 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=phil&product=was-base-iseries&topic=twbs_jaxrs_impl_securejaxrs_step6
File name: twbs_jaxrs_impl_securejaxrs_step6.html