12.10. Managing Security Policies for Nonexperts

This chapter has discussed the technical details of deploying the Java 2 security architecture, as well as how to configure security policies, create keys and certificates, and sign JAR files containing classes. The overall complexity might appear overwhelming to the nonexpert computer user. This complexity is the natural result of having a feature-rich security architecture that must cater to a wide range of needs, such as those that arise in programming secure enterprise applications.

Two approaches are useful for the nonexpert when dealing with this complexity. One is to call in professional care and management. In the case of an enterprise environment, system administrators and information ...

Get Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.