O'Reilly logo

Applied Enterprise JavaBeans™ Technology by Kevin Boone

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

18.7. Security management

The stock quote server example discussed above is not representative of many practical applications, in that it required no authentication. Anyone who knows the hostname and port number can connect and get stock quotes. Practical EISs will require some form of authentication and, very possibly, other security measures as well. These measures may include guarantees of privacy and confidentiality, as discussed in Chapter 16.

This issue is complicated by the fact that there are a great many systems for which we may wish to provide resource adapters, and it would be impossible to set down details of the sign-on procedure in the J2EE Connector Specification. However, just as with JDBC, the Specification recognizes two basic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required