How can the administrator identify these roles and constraints?

Posted by: Pdfprep Category: C9510-401 Tags: , ,

The administrator needs to identify any security role references and security constraints in a web application.

How can the administrator identify these roles and constraints?
A . ibm-application-ext.xml file using a text editor.
B . ibmconfig folder in the application after using the EARExpander command.
C . Web deployment descriptor using IBM Assembly and Deploy Tools.
D . Security role to user/group mapping by using the Integrated Solutions Console (ISC).

Answer: C

Explanation:

Securing web applications using an assembly tool.

You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.

References: https://www.ibm.com/support/knowledgecenter/SS7JFU_8.5.5/com.ibm.websphere.nd.doc/ae/tsec_secweb_atk.html

Leave a Reply

Your email address will not be published.