+

Search Tips   |   Advanced Search

Update and redeploy secured applications


  1. Use the administrative console to modify the existing users and groups mapping to roles.
  2. Use the administrative console to modify the users for the RunAs roles.
  3. Complete and save the changes.
  4. Stop and restart the application for the changes to become effective.
  5. Use an assembly tool.
  6. Use an assembly tool to modify roles, method permissions, auth-constraints, data-constraints and so on.
  7. Save the EAR file
  8. Uninstall the old application
  9. Deploy the modified application
  10. Restart the application

The applications are modified and redeployed. This step is required to modify existing secured applications.


What to do next

If information about roles is modified, update the user and group information using the administrative console. After the secured applications are modified and either restarted or redeployed, verify that the changes are effective by accessing the resources in the application.

  • Secure applications during assembly and deployment
  • Assigning users and groups to roles
  • Assigning users to RunAs roles
  • Security: Resources for learning