JAAS Authentication — An Introduction
Introduction This article introduces JAAS authentication via a relatively simple example. The example presented here is based upon the Sun[…]
Read moreThe Intersection of Identity, Integration, API Management, and Application Security.
Introduction This article introduces JAAS authentication via a relatively simple example. The example presented here is based upon the Sun[…]
Read moreIntroduction The recent JNDI article and an upcoming JAAS article require an LDAP server. This tutorial will walk through the[…]
Read moreIntroduction While researching an upcoming JAAS article, the decision was made to use JNDI to interact with the Openldap server[…]
Read moreIntroduction I’ve mentioned that for larger projects/examples on thinkmiddleware.com, Ant would be used. The Java Security Manager article was the[…]
Read moreIntroduction In the last post, the Java Standard Edition and Java Enterprise Edition security features were introduced. This is the[…]
Read moreIntroduction: While researching details for a Java Security Manager article, it became obvious that I didn’t understand the mappings of[…]
Read moreThe original article is located here.
Read moreThe original article can be found here.
Read moreThe original article can be found here.
Read moreIntroduction In the second part of this series we continue to explore how Unix-like operating systems implement the networking API[…]
Read more