Hour 23. Security
What You'll Learn in This Hour:
How role-based security works
What options are available for you to use when considering your security needs
How to use the FORM authentication method
How to use role-based security programmatically
In Hour 12, "Saving Data Between Requests," you saw how to create a login form and keep track of a user with the session object. The servlet container gives you an alternative to creating your own login form. By adding additional information to the deployment descriptor for your Web application, you can force the user to log in to the application without writing specific code for login authentication.