Chapter 14. The Security Configuration File

The example in the previous section used some pretty simple security: everything is encrypted, and there is no authorization decision being made. In this section we are going to see how we can start tweaking security in GT3. For example, we'll be able to specify that some methods have to be invoked securely while others can be invoked without any security at all. This is done by creating a custom security configuration file.