In the Security property page, you can define how users are authenticated to the server,
and which users have access to particular resources.
Choosing the Authentication Method
To choose the authentication method for users:
From the User Authentication Method drop-down list, choose one of these
methods:
None
If you chose Basic, Digest, or Form Based authentication, click Settings to go to the User Authentication Settings
dialog box and choose the realm name or the login page and error page.
Defining Security Constraints
In the Security Constraints section of the screen, you can define the
for accessing the content of your WAR file:
Click the Add button adjacent to the Security Constraints field and select the appropriate security constraint.
With the security constraint selected, click the Add button in the Web Resource Collections pane to add a
to the security constraint.
Click Add to enter the name of the web resource collection in the Web Resource Collections field.
Click Edit to select the HTTP methods that can be called on these resources.
The Web Resource Collection dialog box is displayed. Check the HTTP methods that
must be added to the web application. You must select at least one of the HTTP methods.
The selected HTTP methods appear in the HTTP Method box of the Web Resource
Collection Pane.
From the Network Security requirement menu, select the
, either None,
, or .
In the Authorized Roles pane, click Edit to define the
for this security constraint.