File APIs for Java Developers
Manipulate DOC, XLS, PPT, PDF and many others from your application.
http://aspose.com/file-tools
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

Doubt in Auth-Constraint

 
Padma priya Gururajan
Ranch Hand
Posts: 437
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
<security-constraint>
....
<auth-constraint>
<role-name>Member<role-name>
</auth-constraint>
</security-constraint>

<security-constraint>
...
<auth-constraint/>
</security-constraint>

My doubt is who is given access?


Thanks in advance.
 
Khadija Lokhandwala
Ranch Hand
Posts: 33
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hi,
when any role name is combined with an empty <auth-constraint/> tag, no one is given access.
So , in your case no one (not even Member) can access it.
Thanks
 
Joe Harry
Ranch Hand
Posts: 10045
3
Eclipse IDE Mac PPC Ubuntu
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
This is very clearly explained in the Head First in the security chapters.
 
Sandeep Vaid
Ranch Hand
Posts: 392
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator


If the same url (resource) are constrained, then only no one will be able to access the constrained resource..
 
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic