11.5 Conclusion

This chapter explained key security concepts and showed how security is handled within an EJB container. The EJB architecture shifts the responsibility for securing an application from the application developer to qualified vendors, such as EJB container and server vendors, who are experts in the security domain.

Configuring an application's security is also done outside the application code, principally by mapping the security roles and method permissions defined in the deployment descriptor to the users and user groups in the target operational environment. These tasks are declarative in nature and typically are carried out by the system administrator and deployer.

This chapter concludes the main portion of the book. It is followed by Appendix A, which lists some of the supporting code examples that are less central to the example applications.



Applying Enterprise Javabeans
Applying Enterprise JavaBeans(TM): Component-Based Development for the J2EE(TM) Platform
ISBN: 0201702673
EAN: 2147483647
Year: 2003
Pages: 110

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net