+

Search Tips   |   Advanced Search

Security terminology


Security workflow example

The following example demonstrates how the security is applied when a user requests access to a resource. For example, a user Bob wants to access a servlet myWebApp. See the code samples in Get started with security .

To access the servlet myWebApp, the following conditions must be true:

  1. Bob must be able to log in to the system because the servlet is protected.
  2. Bob must be in the testing role because the servlet is restricted using an auth-constraint element in the deployment descriptor.

If Bob cannot log in to the system, or Bob is not in the testing role, then the access to the servlet myWebApp is denied.

Another user Alice can log in to the system because Alice is a valid user. But Alice is not in the testing role. An HTTP 403 error (Access Denied/Forbidden) displays when Alice logs in.


Parent topic: Security


Parent topic: Get started with security