Use this tab to configure security roles and method permissions for a bean.
|InsertInsertInsertInsertInsertInsertInsertInsertInsertShift BackspaceInsertShift Backspace||Click this button to define a custom security role by specifying the security role name and optional description in the Add Security Role dialog box. A column for a new security role is added to the table.|
|F4F4F4F4F4F4F4F4F12 or Ctrl+Shift+ECommand Down or F4F4F3||Click this button to change the selected security role by choosing the desired role from the submenu, and changing the security role name and optional description in the Edit Security Role dialog box.|
|DeleteDeleteDeleteDeleteDelete or Ctrl+DDeleteDeleteDeleteDeleteDelete, Backspace or Command BackspaceDelete, Backspace or Command BackspaceDelete, Backspace or Command Backspace||Click this button to delete the selected security role.|
|Name||This column shows beans, their interfaces, and a list of methods that they implement.|
|Excluded||Select the check boxes in this column for the methods, which you want to add to the list of excluded methods. The selected methods will be added to the <exclude-list > section of the deployment descriptor.|
|Unchecked||Select the check boxes in this column for the methods with unchecked permissions. The selected methods will be marked as <unchecked/> in the deployment descriptor.|
|<security role >||Select the check boxes for the methods to assign the selected security roles.|