Define Security Constraints

In the Security dialog box, provide the enterprise bean's and the to which you want to map the security role references.
  1. Click Add.
  2. In the Coded Name column, enter the security role reference that is hardcoded in the enterprise bean's code. The security role references are hardcoded as arguments to the isCallerInRole methods.
  3. Click Edit Roles if the security role name that you want to map to is not listed in the Role Name column.
  4. Select the security role name that maps to the coded name from the drop-down menu in the Role Name column.
  5. Indicate which role has access to which methods by selecting the appropriate checkboxes in the Method permissions panel.

To delete a role name from the list, select the row containing the role name and click Delete. A confirmation dialog will ask you if you really want to delete the row.

See Also:

Edit Security Constraints
Edit Roles


Copyright 1999, 2000 Sun Microsystems, Inc. All Rights Reserved.