[ Team LiB ] Previous Section Next Section

Hour 23. Security

What You'll Learn in This Hour:

  • How role-based security works

  • What options are available for you to use when considering your security needs

  • How to use the FORM authentication method

  • How to use role-based security programmatically

In Hour 12, "Saving Data Between Requests," you saw how to create a login form and keep track of a user with the session object. The servlet container gives you an alternative to creating your own login form. By adding additional information to the deployment descriptor for your Web application, you can force the user to log in to the application without writing specific code for login authentication.

    [ Team LiB ] Previous Section Next Section