posted 16 years ago
Hi,
Given that a Deployment Descriptor has only one security role, defined as:
1. <security-role>
2. <role-name>Member</role-name>
3. </security-role>
Which are valid <auth-constraint> elements that will allow users to access resources constrained by the security role declared?
The answers are
1. <auth-constraint>*</auth-constraint>
2. <auth-constraint><Member</auth-constraint>
Now, I am clear with the second answer. I am not clear with the first answer. How can *(which refers to all) be given access? Can anybody help me?
With regards,
Padma priya N.G.
Padma priya N.G.
Be the change you want to be - Mahatma Gandhi