Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The role and authorizations that are defined in the generated file can be used by JEAF Security to ensure security at runtime.

...

For further information please also refer to: