Show TOC Start of Content Area

Procedure documentation Editing the Security Properties of an EJB JAR  Locate the document in its SAP Library structure

Use

This procedure provides you with the ability to specify security roles and the methods they can access.

Procedure

       1.      In your DLP project, choose the J2EE Components tab.

       2.      Choose an EJB JAR from the list of available ones.

       3.      Choose the Security tab. The Security tabbed pane opens.

       4.      Enter information for the security roles and their access to the methods of the EJB JAR.

Managing Security Roles

...

       1.      Choose the Security Roles tab.

       2.      To create a new security role:

                                                  i.       Enter a name for the new role in the Role Name field.

                                                ii.       If necessary, enter a description for the role in the Security Role Descriptionfield.

                                               iii.       To add the new role to the Security Roles list, click the Add button.

       3.      To modify a security role:

                                                  i.       Select that role from the Security Roles list.

                                                ii.       Change its name or description.

                                               iii.       Click the Modify button.

       4.      To clear the entries from the Role Name and Security Role Description fields, click the Clear button.

       5.      To remove a role from the Security Roles list, select it and click the Remove button.

Managing Access to Methods

Note

You can set a security role on a method, on an interface and on the whole bean. If you set a security role on a bean, this role will appear for all interfaces and their methods in the tree. If you set a security role on an interface, this role will appear for all methods of this interface.

...

       1.      Select a class or method from the list in the Methods field.

       2.      To add a security role for this method:

                                                  i.       Select a security role from the Available Roles list.

Note

This list is identical with the Security Roles list in the Security Roles tab.

                                                ii.       Click the button with the arrows, pointing to the left. The security role appears in the Selected Roles list.

       3.      To remove a security role from the list of the method:

                                                  i.       Select the role from the Selected Roles list.

                                                ii.       Click the button with the arrows pointing to the right. The security role is removed from Selected Roles list only.

Note

The role that you make available for one method is available for all of its descendants.

       4.      To denote that the method:

                                                  i.       Should be selected for authorization (the checked type of access to a method), select the Checked radio button.

                                                ii.       Should not be selected for authorization (the unchecked type of access to a method), check the Unchecked radio button.

Note

You can not set security roles for this kind of methods.

                                               iii.       If it cannot be called (the excluded type of access to a method), check the Excluded radio button.

Note

It is not necessary to set security roles for this type of methods.

       5.      Enter a description for the chosen access to the method in the Description field if necessary.

 

 

End of Content Area