Security

Web Application WAR file -> Security tabbed pane

In the Security tabbed pane, you can define how the client authenticates users to the server and which users have access to a particular resource.

Choose the Authentication Method

  1. From the Authentication method drop-down list, choose one of these methods:
  2. If you chose Basic or Form authentication, click Settings to choose the realm name or the login page and errorLegal Notices page.

Define Security Constraints

In the Security Constraints section of the screen, define the for your WAR file.

  1. Click the Add Constraints button adjacent to Security Constraints field.
  2. With the security constraint selected, click the Add Collections button in the Web Resource Collections pane to add a to the security constraint.
  3. Enter the name of the web resource collection in the Web Resource Collections field.
  4. Click Edit Collections to add resources to the web resource collection.
  5. From the Network Security requirement drop-down list, select the , either None, , or .
  6. In the Authorized Roles pane, click the Edit Roles button to define for this security constraint.
  7. See also

    User Authentication Settings

    Authorized Roles for Security Constraint

    Edit Roles



    Legal Notices