...
The role and authorizations that are defined in the generated file can be used by JEAF Security to ensure security at runtime.
...
For further information please also refer to:
Source Code Example
Expand | ||||||
---|---|---|---|---|---|---|
| ||||||
|
...
The role and authorizations that are defined in the generated file can be used by JEAF Security to ensure security at runtime.
...
For further information please also refer to:
Expand | ||||||
---|---|---|---|---|---|---|
| ||||||
|