+

Search Tips   |   Advanced Search

Updating and redeploying secured applications


This section addresses the way to update existing applications.

Before you perform this task, secure Web apps, secure EJB applications, and deploy them in WAS.

 

  1. Use the admin console to modify the existing users and groups mapping to roles. For information on the required steps, see Assigning users and groups to roles.

  2. Use the admin console to modify the users for the RunAs roles. For information on the required steps, see Assigning users to RunAs roles .

  3. Complete and save the changes.

  4. Stop and restart the application for the changes to become effective.

  5. Use an assembly tool.

    See Assembling applications.

  6. Use an assembly tool to modify roles, method permissions, auth-constraints, data-constraints and so on.

    See Assembling applications.

  7. Save the EAR file, uninstall the old application, deploy the modified application and start the application to make the changes effective.

 

Results

The applications are modified and redeployed. This step is required to modify existing secured applications.

 

Next steps

If information about roles is modified, make sure that you update the user and group information using the admin console. After the secured applications are modified and either restarted or redeployed, verify that the changes are effective by accessing the resources in the application.

 

Related tasks


Assigning users and groups to roles
Assigning users to RunAs roles
Secure applications during assembly and deployment

 

Related


Security: Links