O'Reilly logo

IBM WebSphere V5.0 Security: WebSphere Handbook Series by Stephen Pipes, Rao Maheshwar, David Leigh, Floyd Langley, Piotr Kisielewicz, Paul Creswick, Derek Carpenter, Peter Kovari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8.7. Programmatic login

When you want to implement your own login mechanism for your application, you may want to use JAAS and implement the required programmatic login.

Figure 8-8 shows the activity diagram for JAAS and how the different components are working together during a login process.

Figure 8-8. JAAS sequence diagram

The step-by-step process is described below:

  1. The application starts the login process using JAAS.

  2. The LoginContext is initialized.

  3. During the login process, executed in the LoginContext, a Principal will be authenticated using the specified callback handler.

  4. If the authentication was successful the LoginContext commits ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required