Security constraint assembly settings
Use the Security constraints panel to configure security constraints.
To view this Application Assembly Tool (AAT) panel, open an existing or create a new Web module. Right-click Security Constraints from the left navigation menu. Click New.
If multiple security constraints are specified, the container uses the "first match wins" rule when processing a request to determine what authentication method to use, or what authorization to allow
Security constraint name
- Specifies the name of the security constraint.
Data type String
Authorization Constraints - Roles
- Specifies the user roles that are permitted access to this resource collection.
Data type String
Authorization Constraints - Description
- Contains a description of the authorization constraints
Data type String
User Data Constraints - Transport guarantee
- Indicates how data communicated between the client and the server is to be protected.
Specifies that the protection for communications between the client and server is None, Integral, or Confidential.
- None means that the application does not require any transport guarantees.
- Integral means that the application requires that the data sent between the client and the server must be sent in such a way that it cannot be changed in transit.
- Confidential means that the application requires that the data must be transmitted in a way that prevents other entities from observing the contents of the transmission.
In most cases, Integral or Confidential indicates that the use of SSL is required.
Data type String
User Data Constraints - Description
- Contains a description of the user data constraints.
Data type String
IBM is a trademark of the IBM Corporation in the United States, other countries, or both.