Introduction It has been a couple of weeks since the last article was published. Recently, I had to dig into[…]
Read moreCategory: Uncategorized
Dumping the contents of a JAAS Subject
In the last article, JAAS was introduced. An authenticated calling-entity (perhaps a user), has a JAAS Subject. This JAAS Subject[…]
Read moreJAAS Authentication — An Introduction
Introduction This article introduces JAAS authentication via a relatively simple example. The example presented here is based upon the Sun[…]
Read moreAn Openldap Directory Server
Introduction The recent JNDI article and an upcoming JAAS article require an LDAP server. This tutorial will walk through the[…]
Read moreJNDI — Java Naming & Directory Interface
Introduction While researching an upcoming JAAS article, the decision was made to use JNDI to interact with the Openldap server[…]
Read moreAnt — Build Control
Introduction I’ve mentioned that for larger projects/examples on thinkmiddleware.com, Ant would be used. The Java Security Manager article was the[…]
Read moreThe Java Security Manager
Introduction In the last post, the Java Standard Edition and Java Enterprise Edition security features were introduced. This is the[…]
Read moreJava Security — The Low-Level details To J2EE Security–And, Beyond
Introduction: While researching details for a Java Security Manager article, it became obvious that I didn’t understand the mappings of[…]
Read moreJava Networking API vs. The C library networking API
The original article is located here.
Read moreConcurrency And Server-Side Networking APIs — Part 4
The original article can be found here.
Read more