Jetty Logo
Contact the core Jetty developers at www.webtide.com

private support for your internal/customer projects ... custom extensions and distributions ... versioned snapshots for indefinite support ... scalability guidance for your apps and Ajax/Comet projects ... development services from 1 day to full product delivery

DRAFT

This page contains content that we have migrated from Jetty 7 or Jetty 8 documentation into the correct format, but we have not yet audited it for technical accuracy in with Jetty 9. Be aware that examples or information contained on this page may be incorrect. Please check back soon as we continue improving the documentation, or submit corrections yourself to this page through Github. Thank you.

Authorization

Blah blah blah
Blah blah blah

There are two aspects to securing a web application(or context) within Jetty:

Authentication

The web application can be configured with a mechanism to determine the identity of the user. See Configurating Security - Authentication.

Authorization

Once the identify of the user is known (or not known), the web application can be configured with security constraints that declare what resources that user may access. This is covered in this section.

Blah blah blah

blah blah blah

Blah blah blah

blah blah blah

See an error or something missing? Contribute to this documentation at Github!