This page last changed on Dec 14, 2005 by hcunico@gmail.com.


Article donated by: Simon Godik, Hernan Cunico

The following are a series of articles that will help you understand better security and how those comcepts are implemented in Apache Geronimo.

  1. Concepts
  2. Login into Geronimo
  3. Geronimo and JAAS
  4. JaasLoginService API Discussion
  5. Component Configuration
  6. Authorization \- mapping J2EE roles to Principals
  7. Security Definition Schema
  8. Geronimo Login Config Schema
  9. Deploying secure applications
  10. Available login modules
  11. Mapping J2EE Roles in M5 release
Document generated by Confluence on Dec 15, 2005 19:14