Network Deployment (Distributed operating systems), v8.0 > End-to-end paths > Web services - RESTful services > Implement secure JAX-RS applications

  Previous Step   Next Step


(optional) Secure downstream JAX-RS resources.

 Step 6: Implement secure JAX-RS applications JAX-WSWe can secure downstream JAX-RS resources by configuring the BasicAuth method for authentication and by using the LTPA JAX-RS security handler to take advantage of single sign-on for user authentication.

Secure JAX-RS resources using annotations.


Support information (generally applicable)


What to do next

(optional) Secure JAX-RS clients using SSL.

  Previous Step   Next Step







+

Search Tips   |   Advanced Search