Which are valid <auth-constraint> elements that will allow users to
access resources constrained by the security role declared?
(Choose all that apply.)
A. <auth-constraint/>
B. <auth-constriant>*</auth-constraint>
C. <auth-constraint>Member</auth-constraint>D. <auth-constraint>MEMBER</auth-constraint>
E. <auth-constraint>”Member”</auth-constraint>
Given answers B, C
I am agree with the option C, but i haven't notive option B anywhere in the book. Is this gives the same effect if we say ???
<auth-constriant>
<role-name>*<role-name>
</auth-constraint>