
You specify security constraints to a set of Web application's resources by restricting access to them only to certain security principals. That is, only authorized users can call resources from this set. You define the set of resources by either specifying a URL pattern, or specifying one or more HTTP methods that can be executed by authorized users only. If you use URL patterns to define the Web resources, each HTTP request that contains that pattern is subject to the security constraint you defined. Similarly, subject to constraint is any request that attempts to perform the HTTP method that you have specified in the constraint.
You specify the security constraints in the web.xml descriptor of your Web application.
In order to specify authorization constraints for the corresponding set of Web resources, you must have defined security roles for that Web application as described in Defining Web Applications Security Roles .
On the web.xml screen, proceed as follows:
| Value | Description |
|---|---|
|
NONE |
There are no requirements for the transport protocol. |
|
INTEGRAL |
The transport protocol must guarantee that the data cannot be changed during transmission. |
|
CONFIDENTIAL |
The transport protocol must guarantee that the data cannot be read during transmission. |