Securing Java EE Applications
Java EE applications are made up of components that can be deployed into different containers. These components are used to build a multi-tier enterprise applications. Security services are provided by the component container and can be implemented using declarative or programmatic techniques. Java EE security services provide a robust and easily configured security mechanism for authenticating users and authorizing access to application functions and associated data. Java EE security services are separate from the security mechanisms of the operating system.
The ways to implement Java EE security services are discussed in a general way in Securing Containers (page 866). This chapter provides more detail and a few examples that explore these security services as they relate to Java EE components. Java EE security services can be implemented in the following ways:
- Metadata annotations (or simply, annotations) enable a declarative style of programming. Users can specify information about security within a class file using annotations. When the application is deployed, this information can either be used by or overridden by the application deployment descriptor.
- Declarative security expresses an application's security structure, including security roles, access control, and authentication requirements in a deployment descriptor, which is external to the application.
Any values explicitly specified in the deployment descriptor override any values specified in annotations.
- Programmatic security is embedded in an application and is used to make security decisions. Programmatic security is useful when declarative security alone is not sufficient to express the security model of an application.
Some of the material in this chapter assumes that you have read Chapter 28, "Introduction to Security in Java EE", therefore we recommend that you explore that chapter before beginning this one.
This chapter includes the following topics:
Other chapters that discuss security include the following:
- Chapter 30, "Securing Web Applications" discusses security specific to web components such as servlets and JSP pages.
- Chapter 31, "Securing Web Services" discusses using message security in web services. This chapter and Chapter 30, "Securing Web Applications" discuss securing web service endpoints.