Before you begin
Before you perform this task, you should have already completed the steps in Securing Web applications using an assembly tool and Securing enterprise bean applications where you created new roles and assigned those roles to EJB and Web resources. Complete these steps during application installation. This is because the environment (user registry) under which the application is running is not known until deployment.Why and when to perform this task
If you already know the environment in which the application is running and the user registry that is used, then you can use an assembly tool to assign users and groups to roles. It is recommended that you use the administrative console to assign users and groups to roles.Steps for this task
Result
The ibm-application-bnd.xmi file in the application contains the users and groups to roles mapping table (authorization table).What to do next
After securing an application, install the application using the administrative console.Related concepts
Web component security
Role-based authorization
Related tasks
Assembling applications
Related reference
Security: Resources for learning