Authenticating Connections to JavaStop

Generally, Internet applications use multitiered architectures and access the databases via multiple networks. JavaStop is one such example, as shown in Figure 11.1. The database servers need to be able to trust that the client is who it says it is, and the application server is who it says it is.

Two methods are commonly used for such authentication: Passwords and Digital Certificates.

Authentication Using Passwords

Password management is enhanced in Oracle8i. Oracle8i allows you to manage and protect user passwords by specifying several characteristics such as

  • Password lifetime and expiration— A time limit can be associated with the use of a password. Once the time limit is reached, the password has to ...

Get e-Commerce Applications Using Oracle8i and Java from Scratch now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.