Getting Started
Prerequisites
You have determined that you can protect your application by limiting access to the entire application as a whole.
More information: Approaches to Protecting Applications .
Context
Protecting your application is about giving the user administrator the ability to limit who can access your application and what they can do with it. To do this, you must enable your application to identify the user (authentication) and determine if this user has permission (authorization) to do whatever your application requires.
This procedure provides an overview of how to require authentication and authorization for your application in the simplest way.
Procedure
Results
The administrator of the target system can build UME roles from the Java EE security roles deployed with your application. Next the administrator assigns the UME roles to users.