Security role mappings are module-level configuration. For web modules, specify the security constraint and its authorized role in the module level, as well as provide role mapping. All mapping information will be written out to sun-application.xml. For EJB jars, users enter the role name defined in the code for the enterprise bean, as well as provide role mapping.
Before mapping users or groups to roles, you must have already defined the users/groups roles for the Sun Java System Application Server. You can define users and groups using the Sun Java System Application Server Admin Console or the Command Line option. For detail instructions, consult the Admin Console online help.
To assign a role to a user/group: