Document Information Preface Part I Introduction 1. Overview 2. Using the Tutorial Examples Part II The Web Tier 3. Getting Started with Web Applications 4. Java Servlet Technology 5. JavaServer Pages Technology 6. JavaServer Pages Documents 7. JavaServer Pages Standard Tag Library 8. Custom Tags in JSP Pages 9. Scripting in JSP Pages 10. JavaServer Faces Technology 11. Using JavaServer Faces Technology in JSP Pages 12. Developing with JavaServer Faces Technology 13. Creating Custom UI Components 14. Configuring JavaServer Faces Applications 15. Internationalizing and Localizing Web Applications Part III Web Services 16. Building Web Services with JAX-WS 17. Binding between XML Schema and Java Classes 18. Streaming API for XML 19. SOAP with Attachments API for Java Part IV Enterprise Beans 20. Enterprise Beans 21. Getting Started with Enterprise Beans 22. Session Bean Examples 23. A Message-Driven Bean Example Part V Persistence 24. Introduction to the Java Persistence API 25. Persistence in the Web Tier 26. Persistence in the EJB Tier 27. The Java Persistence Query Language Part VI Services Overview of Java EE Security A Simple Security Example Step 1: Initial Request Step 2: Initial Authentication Step 3: URL Authorization Step 4: Fulfilling the Original Request Step 5: Invoking Enterprise Bean Business Methods Security Functions Characteristics of Application Security Security Implementation Mechanisms Java SE Security Implementation Mechanisms Java EE Security Implementation Mechanisms Application-Layer Security Transport-Layer Security Message-Layer Security Securing Containers Using Deployment Descriptors for Declarative Security Using Annotations Using Programmatic Security Securing the Application Server Working with Realms, Users, Groups, and Roles What Are Realms, Users, Groups, and Roles? What Is a Realm? What Is a User? What Is a Group? What Is a Role? Some Other Terminology Managing Users and Groups on the Application Server Adding Users to the Application Server Adding Users to the Certificate Realm Setting Up Security Roles Mapping Roles to Users and Groups Establishing a Secure Connection Using SSL Installing and Configuring SSL Support Specifying a Secure Connection in Your Application Deployment Descriptor Verifying SSL Support Tips on Running SSL Working with Digital Certificates Creating a Server Certificate Signing Digital Certificates Using a Different Server Certificate with the Application Server Miscellaneous Commands for Certificates Enabling Mutual Authentication over SSL Creating a Client Certificate for Mutual Authentication Further Information about Security 29. Securing Java EE Applications 30. Securing Web Applications 31. The Java Message Service API 32. Java EE Examples Using the JMS API 33. Transactions 34. Resource Connections 35. Connector Architecture Part VII Case Studies 36. The Coffee Break Application 37. The Duke's Bank Application Part VIII Appendixes A. Java Encoding Schemes B. About the Authors Index | | The Java EE 5 Tutorial |  |
Chapter 28Introduction to Security in the Java EE PlatformThis and subsequent chapters discuss how to address security requirements in Java EE,web, and web services applications. Every enterprise that has sensitive resources that canbe accessed by many users, or resources that traverse unprotected, open, networks, suchas the Internet, needs to be protected. This chapter introduces basic security concepts and security implementation mechanisms. More information onthese concepts and mechanisms can be found in theSecurity chapter of theJava EE 5 specification. This document is available for download online athttp://www.jcp.org/en/jsr/detail?id=244. Other chapters in this tutorial that address security requirements include the following: Some of the material in this chapter assumes that you understand basic securityconcepts. To learn more about these concepts, you should explore the Java SEsecurity web site before you begin this chapter. The URL for this siteishttp://download.oracle.com/javase/6/docs/technotes/guides/security/. This tutorial assumes deployment onto the Application Server and provides some information regardingconfiguration of the Application Server. See the Application Server documentation set athttp://docs.sun.com/coll/1343.4for more information. Copyright © 2010, Oracle and/or its affiliates. All rights reserved.Legal Notices |