The topics in this section describe how role-based security is used to
authorize users, or to prevent users, from invoking methods on web services,
page flows, Java controls, and EJBs.
Topics Included in This Section
An Overview of Role-Based Security
Provides a conceptual overview of the relationship between
authorization and authentication, security roles, scoping, and role-principal
mappings.
Implementing Role-Based Security
Demonstrates how to implement role-based authorization for
web services, Java controls, page flows and EJBs.
Creating Principals and Role-Principal Mappings
Describes the relationship between role-principals mapping
definitions and the creation of users or groups.
Related Topics
Authentication