Security Settings For Bean

In the Security dialog box, define the enterprise bean's security settings.

  1. In the Security Identity pane, select which security identity should be used for the execution of the methods of other components that are called from this bean:
    1. Choose Use Caller ID if you want the principal of this enterprise bean's caller to be propagated to other beans that it calls.
    2. Choose Run as Specified Role and select the role from the menu if you want another security identity besides the caller's identity propagated to other beans.
    3. Click Edit Roles if the role that you want to use as the security identity is not in the list. You will be taken to an edit roles dialog where you can add roles to the list, or delete a role from the list.
  2. Click the Deployment Settings box to go to the Deployment Settings dialog if you want to set the security deployment settings at this time. You can enter these settings at a later time, including at the time you are deploying the enterprise bean.
  3. Set the security permissions for the methods of your enterprise bean in each of the interfaces in the Method Permissions panel:
    1. Select the interface and the methods will show up in the Method table. The interface buttons will be disable if the interfaces have not been defined.
    2. Choose a value for the availability column:
      • -All Users (default)
      • -No Users
      • -Selected Roles
    3. If Selected Roles is selected in the Availability column, the checkboxes in the role columns are enabled for selection of roles that have access to the method. Otherwise they are disabled.
    4. In the Role Names Referenced in Code pane, enter the and the to which you want to map the security role references:
      1. Click Add to declare a security role reference.
      2. In the Coded Name column, enter the security role reference that is hardcoded in the enterprise bean's code. The security role references are hardcoded as arguments to the isCallerInRole methods.
      3. Click Edit Roles if the security role name that you want to map to is not listed in the Role Name column.
      4. Select the security role name that maps to the coded name from the drop-down menu in the Role Name column.
    5. To delete a role name from the list, select the row containing the role name and click Delete. A confirmation dialog will ask you if you really want to delete the row.


    Copyright 1999-2001 Sun Microsystems, Inc. All Rights Reserved.