Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 5.3

Anchor
top
top

The following are a series of articles that will help you understand better security and how those comcepts are implemented in Apache Geronimo.

  1. Security concepts
  2. Login into Geronimo
  3. Geronimo and JAAS
  4. JaasLoginService API Discussion
  5. Component Configuration
  6. Authorization - mapping J2EE roles to Principals
  7. Security Definition Schema
  8. Geronimo Login Config Schema
  9. Deploying secure applications
  10. Available login modules
  11. Mapping J2EE Roles in M5 release