In this second part an in-depth look is given at obtaining the container specific role mapper and the container specific way of how a JACC provider is deployed.
from dzone.com: latest front page http://www.dzone.com/links/r/java_ee_authorization_jacc_revisited_part_ii.html
from dzone.com: latest front page http://www.dzone.com/links/r/java_ee_authorization_jacc_revisited_part_ii.html
No comments:
Post a Comment