Component Security

In the Component Security dialog box, choose the that will be used for executing methods of other components called from this web component. In addition, you can enter the from your web component's code and map them to .

Security Identities

Specify the security identity used for executing methods of other components as follows:

  1. In the Security Identity pane, choose the radio button to select Use Caller ID if the caller ID is to be propagated to methods of other components called from this web component.
  2. Otherwise, use the radio button to select Run as Specified Role and select a role from the list of known roles in the WAR file. You may also Click on the Edit Roles box and type in a role not in the list.
  3. You may Click the Deployment Settings box to go to the Deployment Settings dialog to select a client identity from the list of users in the role for use as a "run as" identity.

Map Coded Names to Roles

Use the Role Names Referenced in Code pane to map coded names to security roles: In the Role Names referenced in Code pane you may Click Add to map role names referenced in the web component code to security role names.

  1. In the Coded Name column, enter the security role reference hardcoded in the web component's isUserInRole methods.
  2. Select the security role name that maps to the coded name from the drop-down menu in the Role name column.

To delete a role name reference from the table, select the role name reference and click Delete. A confirmation dialog will ask if you really want to delete the role name reference.


Copyright 1999-2001 Sun Microsystems, Inc. All Rights Reserved.