10.4. User Administration

In Chapter 9 we discussed how to grant permissions to bundles based on where they come from, but not on whose behalf they run. For example, before giving out an employee's payroll information, you must ensure the user is indeed the employee herself. Knowing where the request is originated—even from a trusted location—is insufficient.

To establish the identify of a user, or to authenticate a user, is the prerequisite for making authorization decisions, for only after you have ascertained the identity of the user can you determine to what he is entitled. Authentication is achieved by verifying something a user has (fingerprint) or knows (password).

The Java 2 runtime environment has been supporting authorization based ...

Get Programming Open Service Gateways with Java Embedded Server™ Technology now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.