This week's book giveaway is in the OO, Patterns, UML and Refactoring forum. We're giving away four copies of Refactoring for Software Design Smells: Managing Technical Debt and have Girish Suryanarayana, Ganesh Samarthyam & Tushar Sharma on-line! See this thread for details.
Although it is pretty clear to me how to setup security constraints in J2EE, it is not clear how the different types of authentication mechanisms are implemented. For example, for the FORM type, where is the POST sending the data?
I need to know how to specify the database of username, passwords and roles in order to include it in my diagrams.