O'Reilly logo

Applied Enterprise JavaBeans™ Technology by Kevin Boone

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

16.5. EJB security in the enterprise

This section describes the problems that EJB-to-EJB interactions cause for enterprise-level security. It is important to keep in mind that the problems discussed in this section apply mostly to wide-area EJB-to-EJB method calls, which are mostly likely to be significant in business-to-business applications. The more common, Web-based model of application provision does not suffer from the same limitations. We begin with a discussion of the use of firewalls, and the problems that EJB protocols impose on their use. Then we will consider various solutions to these problems, including the use of HTTP-based communications protocols as an alternative to IIOP.

16.5.1. The problem

The Internet is a very useful medium ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required