File APIs for Java Developers
Manipulate DOC, XLS, PPT, PDF and many others from your application.
A friendly place for programming greenhorns!
Big Moose Saloon
Register / Login
Joined: Sep 24, 2009
Jun 22, 2010 03:01:04
With respect to
security, when we say
<security-constraint> <auth-constraint> <role-name>*</role-name> </auth-constraint> </security-constraint>
to mean all users are allowed access to constrained resource. Is it unauthenticated access?
I am slow but sure
I agree. Here's the link:
Doubt in Auth-Constraint
Head first book mock exam doubt
SCWCD Exam Tips
Tomcat with multiple auth-constraints
regarding web app security
All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter
| Powered by
Copyright © 1998-2015