private support for your internal/customer projects ... custom extensions and distributions ... versioned snapshots for indefinite support ... scalability guidance for your apps and Ajax/Comet projects ... development services from 1 day to full product delivery
This page contains content that we have migrated from Jetty 7 or Jetty 8 documentation into the correct format, but we have not yet audited it for technical accuracy in with Jetty 9. Be aware that examples or information contained on this page may be incorrect. Please check back soon as we continue improving the documentation, or submit corrections yourself to this page through Github. Thank you.
There are two aspects to securing a web application(or context) within Jetty:
The web application can be configured with a mechanism to determine the identity of the user. See Configurating Security - Authentication.
Once the identify of the user is known (or not known), the web application can be configured with security constraints that declare what resources that user may access. This is covered in this section.
See an error or something missing? Contribute to this documentation at Github!