Security role to user and group mappings

Use this page to map security roles to users. We can map roles to specific users, to specific groups, or to different categories.

To view this administrative console page, click Application > Install New Application. While running the Application Installation Wizard, prompts appear to help you map security roles to users or groups. To change role to user or group mappings for deployed applications, click Application > Enterprise Application > deployed_application > Map security roles to users/groups.

Users

Specifies the users for role mapping. Verify that the users are defined in your chosen user registry.

To change the roles to users mapping, click Manage Application > application > Map security roles to users.

Data type: String

Groups

Specifies the groups for role mapping. Verify that the groups are defined in your chosen user registry.

To change the roles to users mapping, click Manage Application > application > Map security roles to groups.

Data type: String

Roles

Specifies the roles to which you want to map users and groups. Role privileges give users and groups permission to run as specified.

Select the check boxes to choose a role or a set of roles. Click Look-up Users to map users to the roles that you have selected. Click Look-up Groups to map groups to the selected roles. Use the check boxes to map roles to EVERYONE or ALL AUTHENTICATED special subject.

Data type: String

Everyone

Specifies to map roles to everyone. Mapping a role to everyone means that anyone can access resources protected by this role, and essentially, there is no security.

Data type: Boolean

All Authenticated

Specifies to authenticate all users. Roles are mapped to all authenticated users, and all authenticated users in the selected user registry are granted access to the role.

Data type: Boolean


 

Related Tasks


Securing enterprise bean applications
Securing Web applications using an assembly tool