Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Authorizing access to resources


Authorization technology

Authorization information determines whether a user or group has the necessary privileges to access resources.

WAS supports many authorization technologies including the following:


Related


Administrative roles and naming service authorization
Role-based authorization
Administrative roles
Authorization providers
Delegations
Web component security
Java 2 security
Multiple security domains
Secure enterprise bean applications


Related


Naming roles

+

Search Tips   |   Advanced Search