The following are a series of articles that will help you understand better security and how those comcepts are implemented in Apache Geronimo.
- Security concepts
- Login into Geronimo
- Geronimo and JAAS
- JaasLoginService API Discussion
- Component Configuration
- Authorization - mapping J2EE roles to Principals
- Security Definition Schema
- Geronimo Login Config Schema
- Deploying secure applications
- Available login modules
- Mapping J2EE Roles in M5 release