Fine-grained Java EE authorization using Enum-based access control lists with EAz, Part 2: Understanding and using the EAz implementation
From the developerWorks archives
Date archived: January 3, 2017 | First published: December 12, 2007
Java™ developers attempting to exert fine-grained control over access to application resources quickly reach the limits of built-in Java Platform, Enterprise Edition (Java EE) declarative authorization. Part 1 of this three-part series on Enum-based Authorization (EAz) described the basic architecture of a complete Access Control List (ACL) implementation in Java 5. Part 2 describes the usage and implementation of the EAz authorization solution, building on the example from Part 1. This content is part of the IBM WebSphere Developer Technical Journal.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.