Summary

In this chapter, we looked at the basic security-related APIs that come with JXTA. The JXTA protocols are designed with the idea of security: advertisements may be signed, membership within peergroups may be authenticated, and so on. However, JXTA does not impose a particular security model on its peers; we’ve seen traditional examples in this chapter that use digital signatures and Unix-style passwords. At a protocol level, however, JXTA can support any security model that makes sense for a particular set of peers.

Get JXTA in a Nutshell now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.