About this task
Step 6 towards the goal:
Implementing secure JAX-RS applications
Procedure
You can secure downstream JAX-RS resources by configuring
the BasicAuth method for authentication and by using the LTPA JAX-RS
security handler to take advantage of single sign-on for user authentication.