Network Deployment (Distributed operating systems), v8.0 > End-to-end paths > Web services - RESTful services > Implement secure JAX-RS applications
Previous Step Next Step
(optional) Secure downstream JAX-RS resources.
Step 6: Implement secure JAX-RS applications JAX-WSWe can secure downstream JAX-RS resources by configuring the BasicAuth method for authentication and by using the LTPA JAX-RS security handler to take advantage of single sign-on for user authentication.
Secure JAX-RS resources using annotations.
Support information (generally applicable)
What to do next
(optional) Secure JAX-RS clients using SSL.
Previous Step Next Step