blob: 02fb0ea27fedcff36a28d8a80ea588cc06a03fc1 [file] [log] [blame]
// ========================================================================
// Copyright (c) 1995-2017 Mort Bay Consulting Pty. Ltd.
// ========================================================================
// All rights reserved. This program and the accompanying materials
// are made available under the terms of the Eclipse Public License v1.0
// and Apache License v2.0 which accompanies this distribution.
//
// The Eclipse Public License is available at
// http://www.eclipse.org/legal/epl-v10.html
//
// The Apache License v2.0 is available at
// http://www.opensource.org/licenses/apache2.0.php
//
// You may elect to redistribute this code under either of these licenses.
// ========================================================================
[[configuring-security-authorization]]
=== Authorization
There are two aspects to securing a web application(or context) within
Jetty:
Authentication::
The web application can be configured with a mechanism to determine
the identity of the user. See
link:#configuring-security-authentication[Configurating Security -
Authentication].
Authorization::
Once the identify of the user is known (or not known), the web
application can be configured with security constraints that declare
what resources that user may access. This is covered in this section.
==== Blah blah blah
blah blah blah
==== Blah blah blah
blah blah blah