The largest Interview Solution Library on the web


java tutorials/
« Previous | 1 | 2 | 3 | Next »

Exploiting J2SE Security (1/4)


  • How can J2SE mechanisms perform container-based authentication / authorization ?

  • JAAS login modules perform principal authentication

  • JAAS principal created

  • Maps authenticated principal to EJB role(s)

  • EJB method authorization is based on permission for an EJB role
« Previous | 1 | 2 | 3 | Next »


copyright © 2014 - all rights riserved by javatechnologycenter.com