The part of an entity bean"s deployment descriptor that defines the bean"s persistent fields and relationships.
The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints.
A J2EE component that typically executes in a Web browser but can execute in a variety of other applications or devices that support the applet programming model.
A container that includes support for the applet programming model.
A person who combines J2EE components and modules into deployable application units.
A first-tier J2EE client component that executes in its own Java virtual machine. Application clients have access to some J2EE platform APIs.
application client container
A container that supports application client components.
application client module
A software unit that consists of one or more classes and an application client deployment descriptor.
application component provider
A vendor that provides the Java classes that implement components" methods, JSP page definitions, and any required deployment descriptors.
application configuration resource file
An XML file used to configure resources for a JavaServer Faces application, to define navigation rules for the application, and to register converters, validators, listeners, renderers, and components with the application.
The process of saving the state of an object and restoring it.
A qualifier on an XML tag that provides additional information.
The process that verifies the identity of a user, device, or other entity in a computer system, usually as a prerequisite to allowing access to resources in a system. The Java servlet specification requires three types of authentication-basic, form-based, and mutual-and supports digest authentication.
The process by which access to a method or resource is determined. Authorization depends on the determination of whether the principal associated with a request through authentication is in a given security role. A security role is a logical grouping of users defined by the person who assembles the application. A deployer maps security roles to security identities. Security identities may be principals or groups in the operational environment.
An authorization rule that determines who is permitted to access a Web resource collection.