In the previous chapter, we learned how to deploy JEE applications in the cloud. In this chapter, we will learn how to secure JEE applications—specifically, how to perform authentication and authorization.
We will cover the following topics:
- Securing JEE web applications using deployment descriptors
- Securing JEE web applications using annotations
- Securing web services
- Security enhancements in JEE 8