Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Secure web applications > Web application security components and settings > Secure applications during assembly and deployment
Update and redeploying secured applications
This section addresses the way to update existing applications. Before you perform this task, secure web applications, secure EJB applications, and deploy them in WAS.
Procedure
- Use the admin console to modify the existing users and groups mapping to roles. For information on the required steps, see Assign users and groups to roles.
- Use the admin console to modify the users for the RunAs roles. For information on the required steps, see Assign users to RunAs roles .
- Complete and save the changes.
- Stop and restart the application for the changes to become effective.
- Use an assembly tool. See Assembling applications.
- Use an assembly tool to modify roles, method permissions, auth-constraints, data-constraints and so on. See Assembling applications.
- Save the EAR file, uninstall the old application, deploy the modified application and start the application to make the changes effective.
Results
The applications are modified and redeployed. This step is required to modify existing secured applications.
What to do next
If information about roles is modified, make sure that you update the user and group information using the admin console. After the secured applications are modified and either restarted or redeployed, verify that the changes are effective by accessing the resources in the application.
Assign users and groups to roles
Assign users to RunAs roles
Secure applications during assembly and deployment
Related
Security: Resources for learning