In the Security dialog box, you can define how users are
authenticated to the server, and which users have access
to particular resources.
Choose the Authentication Method
To choose the authenticfation method for users do the following:
From the User Authentication Method menu, choose one of these
methods:
None
If you chose Basic or Form Based authentication, click Settings to
go to the User Authentication Settings dialog to choose the realm name
or the login page and error page.
Define Security Constraints
In the Security Constraints section of the screen, you can define the
for accessing the content of your WAR file:
Click the Add button adjacent to the Security Constraints field
and select the appropriate security constraint..
With the security constraint selected, click the Add button in the
Web Resource Collections pane to add a
to the security constraint.
Enter the name of the web resource collection in the Web Resource
Collections field.
Click Edit to add resources to the web resource collection.
Select the GET or POST checkbox to specify the HTTP methods that can
be called on these resources. You must select at least one of the
HTTP methods.
From the Network Security requirement menu, select the
, either None,
, or
.
In the Authorized Roles pane, click Edit to define the
for this security constraint.