Secure JAX-RS applications within the web container.

Before you begin

Configure the JAX-RS application.

About this task

Step 4 towards the goal: Implementing secure JAX-RS applications

Procedure

Using the security services available to the web container, you can secure REST resources by configuring security mechanisms that define user authentication, transport security, authorization control, and user to role mappings.

What to do next

Secure JAX-RS resources using annotations.
Task topic    

Terms and conditions for information centers | Feedback

Last updated: April 17, 2014 04:48 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=phil&product=was-base-iseries&topic=twbs_jaxrs_impl_securejaxrs_step4
File name: twbs_jaxrs_impl_securejaxrs_step4.html