aspose file tools*
The moose likes Servlets and the fly likes <security-constraint> element Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login


Win a copy of Java 8 in Action this week in the Java 8 forum!
JavaRanch » Java Forums » Java » Servlets
Bookmark "&lt;security-constraint&gt; element " Watch "&lt;security-constraint&gt; element " New topic
Author

&lt;security-constraint&gt; element

Hamzah khammash
Greenhorn

Joined: Jan 05, 2012
Posts: 23

Hi,
I have question about <security-constraint> element in case i have 2 <security-constrain> elements one of them have <auth-constraint> element and its cover all roles and the
other <security-constrain> have <auth-contraint/> elements with no role selected and both of them have the same resource and <url-patteren>
in this case which <security-constrain> will execute ?
shivam singhal
Ranch Hand

Joined: Jul 15, 2012
Posts: 194

In the above mentioned case none of the defined role can excess the resource via the Http-method mentioned in the 2nd <security-constraint>
 
With a little knowledge, a cast iron skillet is non-stick and lasts a lifetime.
 
subject: &lt;security-constraint&gt; element
 
Similar Threads
auth-constraint doubt
multiple security-constraint elements interaction
HFS exercise on page 658
Authorisation related
No of <auth-constraint> tags