+

Search Tips   |   Advanced Search

Security annotations

With annotations, during application installation, policies and roles are merged with policies and roles defined within the deployment descriptor. This merge is performed by the Annotations Metadata Manager (AMM) facility. When the metadata is merged, the following inheritance rules are followed.

Six security annotations are currently supported. For each annotation, a MergeAction implementation is defined.

The Inherited servlet annotation is a metadata annotation and is not specified in the class. If a subclass does not have security annotation, it automatically inherits security annotation from the parent class. The subclass can overwrite the parent security annotations by specifying its security annotations.


All HTTP methods with no constraints


All HTTP methods with no <auth-constraint> element and confidential TransportGuarantee required


All HTTP methods with all access denied


All HTTP methods except for the GET and POST values with no constraints

For GET, the <auth-constraint> element requires membership in ALL ROLE. For POST, all access is denied.


All HTTP methods except GET, the <auth-constraint> element requires membership in ALL ROLE, and the GET method has no constraints.


All HTTP methods except TRACE, the <auth-constraint> element requires membership in ALL ROLE, and for TRACE, all access is denied.


Related:

  • Authorization providers
  • JACC policy propagation
  • Dynamically update servlet security annotations
  • ServletSecurity