8.4. User-Centric Authentication and Authorization Using JAAS

When Java technology is used to construct a full-fledged distributed system, a whole new range of distributed systems security issues, such as those mentioned in Chapter 1, must be addressed. For example, additional mechanisms are needed to make Remote Method Invocation (RMI) secure in the presence of hostile network attacks. Jini Network Technology takes full advantage of RMI. Jini Network Technology enables digital devices to simply connect together, so service registration and location must be securely managed if the environment contains coexisting but potentially hostile parties. Thus, a full set of higher-level services must be secured, such as transactions for e-commerce. In ...

Get Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.