security-role security-role-ref user-data-constraint web.xml Deployment Descriptors

3-22 Programming Security for Oracle WebLogic Server auth-constraint description constraint for east coast sales description role-nameeastrole-name role-namemanagerrole-name auth-constraint user-data-constraint descriptionSSL not requireddescription transport-guaranteeNONEtransport-guarantee user-data-constraint security-constraint ...

3.5.1.3 security-role

The security-role element contains the definition of a security role. The definition consists of an optional description of the security role, and the security role name. The following table describes the elements you can define within a security-role element.

3.5.1.3.1 Example See

Example 3–14 for an example of how to use the security-role element in a web.xml file.

3.5.1.4 security-role-ref

The security-role-ref element links a security role name defined by security-role to an alternative role name that is hard-coded in the servlet logic. This extra layer of abstraction allows the servlet to be configured at deployment without changing servlet code. The following table describes the elements you can define within a security-role-ref element. Table 3–4 security-role Element Element Required Optional Description description Optional A text description of this security role. role-name Required The role name. The name you use here must have a corresponding entry in the WebLogic-specific deployment descriptor , weblogic.xml, which maps roles to principals in the security realm. For more information, see Section 3.5.2.6, security-role-assignment . Table 3–5 security-role-ref Element Element Required Optional Description description Optional Text description of the role. role-name Required Defines the name of the security role or principal that is used in the servlet code. role-link Required Defines the name of the security role that is defined in a security-role element later in the deployment descriptor. Securing Web Applications 3-23

3.5.1.4.1 Example See

Example 3–17 for an example of how to use the security-role-ref element in a web.xml file.

3.5.1.5 user-data-constraint

The user-data-constraint element defines how data communicated between the client and the server should be protected. The following table describes the elements you can define within a user-data-constraint element.

3.5.1.5.1 Used Within The user-data-constraint element is used within the

security-constraint element.

3.5.1.5.2 Example See

Example 3–11 for an example of how to use the user-data-constraint element in a web.xml file.

3.5.1.6 web-resource-collection