Network Deployment (Distributed operating systems), v8.0 > Applications > Web services > Bus-enabled web services


Operation-level security: Role-based authorization

When you build an EAR file, you can define roles and apply them to methods. When you deploy the EAR file, you can assign individual users or groups to roles. We can use this feature of EAR files to add role-based security to your web service. For example:

  1. You have a web service that controls access to important information, and to give read-only access to some users, and write access to others.

  2. When you build the EAR file you define two roles: READ and WRITE. You apply the READ role to the getData method and the WRITE role to the writeData method.

  3. When you deploy the EAR file in WAS, you assign All Authenticated Users to the READ role and individual users to the WRITE role.

  4. When a user tries to access WebService.getData, their user name and password is checked by the operating system or by Lightweight Third Party Authentication (LTPA).


Password-protecting a web service operation
Use assembly tools to password-protect a web service operation Concept topic

+

Search Tips   |   Advanced Search