Operating Systems: i5/OS
             Personalize the table of contents and search results

 

Security constraints

 

Security constraints determine how Web content is to be protected. These properties associate security constraints with one or more Web resource collections. A constraint consists of a Web resource collection, an authorization constraint and a user data constraint.