Chapter 16. Security II—the conversation

  • Identity—Integrity—Privacy—Secure Sockets Layer—LDAP authentication —JAAS—The RMI Security Extension—Exercises

In this chapter

Chapter 8 was concerned with permissions granted to code.

This chapter is concerned with two further aspects of security: permissions granted to users, and the security of the network conversation itself. This involves several topics:

  • the identity of each party to the conversation

  • the integrity of the message

  • the privacy of the conversation.

Identity

Security concerns the identity of each party to the conversation, in two distinct ways:

  • authentication

  • authorization.

Authentication

We would like each end of a conversation to be able to authenticate itself—prove its identity—to the other end. ...

Get java.rmi: The Remote Method Invocation Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.