| Hour 23. SecurityWhat You'll Learn in This Hour: How role-based security worksWhat options are available for you to use when considering your security needsHow to use the FORM authentication methodHow to use role-based security programmatically
 In Hour 12, "Saving Data Between Requests," you saw how to create a login form and keep track of a user with the session object. The servlet container gives you an alternative to creating your own login form. By adding additional information to the deployment descriptor for your Web application, you can force the user to log in to the application without writing specific code for login authentication. |