+

Search Tips   |   Advanced Search

(Optional) Secure downstream JAX-RS resources.

Secure JAX-RS resources using annotations.

Parent

Implement secure JAX-RS applications

We can secure downstream JAX-RS resources by configuring the BasicAuth method for authentication and using the LTPA JAX-RS security handler to take advantage of single sign-on for user authentication.


What to do next

(Optional) Secure JAX-RS clients using SSL.


Subtopics


Related tasks

  • Secure downstream JAX-RS resources