The following are a series of articles that will help you understand better security and how those comcepts are implemented in Apache Geronimo.

  1. Security concepts
  2. Login into Geronimo
  3. Geronimo and JAAS
  4. JaasLoginService API Discussion
  5. Component Configuration
  6. Authorization - mapping J2EE roles to Principals
  7. Security Definition Schema
  8. Geronimo Login Config Schema
  9. Deploying secure applications
  10. Available login modules
  11. Mapping J2EE Roles in M5 release
  • No labels