Save the enterprise archive (EAR) file, uninstall the old application,
deploy the modified application and start the application to make the changes effective.
Results
The applications are modified and redeployed. This step is required to modify existing secured applications.
What to do next
If information about roles is modified, make sure that you update the user and group information using the administrative console. After the secured applications are modified and either restarted or redeployed, verify that the changes are effective by accessing the resources in the application.