Interview Questions
« Previous | 0 | 1 | 2 | 3 | 4 | Next »

1.JAAS - What is Java Authentication and Authorization Service, JAAS?

Java Authentication and Authorization Service, JAAS - JAAS is an API used for identifying a user or computer that is attempting to execute Java code.....

2.JAAS - Features of JAAS?

Features of JAAS - The features of JAAS are:A Pluggable Authentication Module framework of Java....

3.JAAS - JAAS infrastructure has two services: authentication and authorization?

JAAS services - JAAS authentication component reliably and securely determines who is currently processing Java code....

4.JAAS - Steps involved in JAAS authentication?

JAAS authentication - The steps that are involved in JAAS authentication are: Creation of LoginContext.....

5.JAAS - Describe authorization with JAAS?

Authorization with JAAS - JAAS authorization is an extension of Java security architecture..

6.JAAS - Explain the Authentication Files?

Authentication Files - – This file has main() method. The main() method creates a LoginContext object.....

7.JAAS - Explain the Authorization Files?

Authorization Files - – This class is similar to the class with one difference....

8.JAAS - What are JAAS permissions?

What are JAAS permissions? - Permissions are the core part of authorization. Access to resources is controlled by permissions........

9.JAAS - Login Process in JAAS?

Login Process in JAAS - The login process starts when an access request to an application that is running on Java Authentication System....

10.What is JAAS?

The Java Authentication and Authorization Service (JAAS) is a Java package that enables services to authenticate and enforce access controls upon users. It implements a Java version of the standard Pluggable Authentication Module (PAM) framework, and extends the access control architecture of the Java 2 Platform in a compatible fashion to support user-based authorization.

11.Why Use JAAS?

The latest release of the Java 2 Software Development Kit, v 1.3 provides a means to enforce access controls based on where code came from and who signed it. The need for such access controls derives from the distributed nature of the Java platform, where, for instance, a remote applet may be downloaded over a public network and then run locally.
The Java 2 platform, however, lacks the means to enforce similar access controls based onwho runs the code. To provide this type of access control, the Java 2 security architecture requires additional support for authentication (determining who's actually running the code), and extensions to the existing authorization components to enforce new access controls based on who was authenticated. The Java Authentication and Authorization Service (JAAS) framework augments the Java 2 platform with such support.

Important Features

  • Pure Java implementation.
  • Pluggable Authentication Module (PAM) framework implementation for authenticating users.
  • Single sign-on support.
  • Flexible access control policy for user-based, group-based, and role-based authorization.
  • Sample authentication modules using:
  • Java Naming and Directory Interface (JNDI)
  • Solaris Operating Environment
  • Windows NT

12.J2EE is a container centric architecture. Explain?

A container acts as an interface between a platform-specific functionality and a component. The component must be assembled before a web or enterprise bean or application client component execution, into a JEE application and deployed into its container.

The settings of a container can be customized for underlying support provided by the JEE server. These include security, transaction management, and Java Naming and Directory Interface lookups.

The management of non configurable services such as servlet life cycle, enterprise bean life cycle, database connection, data persistence, database connection pooling also can be done by the container.

13.What are the four components of J2EE application?

  • Application clients components.
  • Servlet and JSP technology are web components.
  • Business components (JavaBeans).
  • Resource adapter components

14.What is JAXP?

JAXP stands for Java API for XML Processing. XML data can be analyzed and authenticated via JAXP. It provides standard services (determination, compression, discovery, creation) using three basic interfaces:

  • Document Object Model (DOM)
  • Simple API for XML (SAX)
  • Streaming API for XML (StAX)

15.Provide an overview of web container?

The web container is used to implement the web components functionality. The functionality specifies an environment, called as runtime environment which the web components security, deployment, life-cycle management transaction management, request-response services. A container manages the servlet / JSP/ EJB functionality. J2EE server runs the components and the containers. A web container will also manage the database connection pooling, data persistence and access to the J2EE API.






« Previous | 0 | 1 | 2 | 3 | 4 | Next »

copyright © 2014 - all rights riserved by