Document Information Preface Part I Introduction 1. Overview 2. Using the Tutorial Examples Part II The Web Tier 3. Getting Started with Web Applications 4. Java Servlet Technology 5. JavaServer Pages Technology 6. JavaServer Pages Documents 7. JavaServer Pages Standard Tag Library 8. Custom Tags in JSP Pages 9. Scripting in JSP Pages 10. JavaServer Faces Technology 11. Using JavaServer Faces Technology in JSP Pages 12. Developing with JavaServer Faces Technology 13. Creating Custom UI Components 14. Configuring JavaServer Faces Applications 15. Internationalizing and Localizing Web Applications Part III Web Services 16. Building Web Services with JAX-WS 17. Binding between XML Schema and Java Classes 18. Streaming API for XML 19. SOAP with Attachments API for Java Part IV Enterprise Beans 20. Enterprise Beans 21. Getting Started with Enterprise Beans 22. Session Bean Examples 23. A Message-Driven Bean Example Part V Persistence 24. Introduction to the Java Persistence API 25. Persistence in the Web Tier 26. Persistence in the EJB Tier 27. The Java Persistence Query Language Part VI Services 28. Introduction to Security in the Java EE Platform Overview of Java EE Security A Simple Security Example Step 1: Initial Request Step 2: Initial Authentication Step 3: URL Authorization Step 4: Fulfilling the Original Request Step 5: Invoking Enterprise Bean Business Methods Security Functions Characteristics of Application Security Security Implementation Mechanisms Java SE Security Implementation Mechanisms Java EE Security Implementation Mechanisms Application-Layer Security Transport-Layer Security Message-Layer Security Securing Containers Using Deployment Descriptors for Declarative Security Using Annotations Using Programmatic Security Working with Realms, Users, Groups, and Roles What Are Realms, Users, Groups, and Roles? What Is a Realm? What Is a User? What Is a Group? What Is a Role? Some Other Terminology Managing Users and Groups on the Application Server Adding Users to the Application Server Adding Users to the Certificate Realm Setting Up Security Roles Mapping Roles to Users and Groups Establishing a Secure Connection Using SSL Installing and Configuring SSL Support Specifying a Secure Connection in Your Application Deployment Descriptor Verifying SSL Support Tips on Running SSL Working with Digital Certificates Creating a Server Certificate Signing Digital Certificates Using a Different Server Certificate with the Application Server Miscellaneous Commands for Certificates Enabling Mutual Authentication over SSL Creating a Client Certificate for Mutual Authentication Further Information about Security 29. Securing Java EE Applications 30. Securing Web Applications 31. The Java Message Service API 32. Java EE Examples Using the JMS API 33. Transactions 34. Resource Connections 35. Connector Architecture Part VII Case Studies 36. The Coffee Break Application 37. The Duke's Bank Application Part VIII Appendixes A. Java Encoding Schemes B. About the Authors Index | | The Java EE 5 Tutorial |  |
Securing the Application ServerThis tutorial describes deployment to the Application Server, which provides highly secure, interoperable,and distributed component computing based on the Java EE security model. The ApplicationServer supports the Java EE 5 security model. You can configure the ApplicationServer for the following purposes: Adding, deleting, or modifying authorized users. For more information on this topic, readWorking with Realms, Users, Groups, and Roles. Configuring secure HTTP and IIOP listeners. Configuring secure JMX connectors. Adding, deleting, or modifying existing or custom realms. Defining an interface for pluggable authorization providers using Java Authorization Contract for Containers (JACC). Java Authorization Contract for Containers (JACC) defines security contracts between the Application Server and authorization policy modules. These contracts specify how the authorization providers are installed, configured, and used in access decisions. Using pluggable audit modules. Setting and changing policy permissions for an application.
The following features are specific to the Application Server: Copyright © 2010, Oracle and/or its affiliates. All rights reserved.Legal Notices |