Secure JAX-RS applications within the web container.
Configure the JAX-RS application.
Parent
Implement secure JAX-RS applications
Use the security services available to the web container, we can secure REST resources by configuring security mechanisms that define user authentication, transport security, authorization control, and user to role mappings.
What to do next
Secure JAX-RS resources using annotations.
Subtopics
- Secure JAX-RS applications within the web container
We can use the security services available from the web container to secure Representational State Transfer (REST) resources. We can configure security mechanisms that define user authentication, transport security, authorization control, and user to role mappings.
Related tasks
Secure JAX-RS applications within the web container