Originally posted by Leo Gao:
How to draw login sequence diagram if I use container managed Security?
Container Managed Security is nothing more that aspect oriented programming. Every container interception as security, transaction and so on, are application of the AOP tecnique at container managed components like
EJB's.
Have said that, you can create your design based on AOP modeling and architecture, which means that you must use Pointcut and Avisor sequence diagrams.
But, IMHO, I would not give so much detail at the sequence diagram, instead, I would provide more 'business view' for those diagrams, once the technical architecture could abstract these details.
Regards,