10.12.2012 Views

The Java EE 5 Tutorial (PDF) - Oracle Software Downloads

The Java EE 5 Tutorial (PDF) - Oracle Software Downloads

The Java EE 5 Tutorial (PDF) - Oracle Software Downloads

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents<br />

22<br />

Working with Realms, Users, Groups, and Roles .......................................................................... 775<br />

What Are Realms, Users, Groups, and Roles? ........................................................................ 776<br />

Managing Users and Groups on the Application Server ....................................................... 779<br />

Setting Up Security Roles .......................................................................................................... 780<br />

Mapping Roles to Users and Groups ....................................................................................... 782<br />

Establishing a Secure Connection Using SSL ................................................................................. 783<br />

Installing and Configuring SSL Support ................................................................................. 783<br />

Specifying a Secure Connection in Your Application Deployment Descriptor ................. 784<br />

Verifying SSL Support ............................................................................................................... 785<br />

Working with Digital Certificates ............................................................................................ 786<br />

Enabling Mutual Authentication over SSL ............................................................................. 790<br />

Further Information about Security ................................................................................................ 793<br />

29 Securing <strong>Java</strong> <strong>EE</strong> Applications .........................................................................................................795<br />

Securing Enterprise Beans ................................................................................................................ 796<br />

Accessing an Enterprise Bean Caller’s Security Context ....................................................... 797<br />

Declaring Security Role Names Referenced from Enterprise Bean Code ........................... 799<br />

Defining a Security View of Enterprise Beans ........................................................................ 801<br />

Using Enterprise Bean Security Annotations ......................................................................... 812<br />

Using Enterprise Bean Security Deployment Descriptor Elements .................................... 813<br />

Configuring IOR Security ......................................................................................................... 814<br />

Deploying Secure Enterprise Beans ......................................................................................... 816<br />

Enterprise Bean Example Applications .......................................................................................... 817<br />

Example: Securing an Enterprise Bean .................................................................................... 818<br />

Example: Using the isCallerInRole and getCallerPrincipal Methods ....................... 823<br />

Discussion: Securing the Duke’s Bank Example ..................................................................... 829<br />

Securing Application Clients ........................................................................................................... 829<br />

Using Login Modules ................................................................................................................ 830<br />

Using Programmatic Login ...................................................................................................... 831<br />

Securing EIS Applications ................................................................................................................ 831<br />

Container-Managed Sign-On .................................................................................................. 831<br />

Component-Managed Sign-On ............................................................................................... 832<br />

Configuring Resource Adapter Security ................................................................................. 832<br />

Mapping an Application Principal to EIS Principals ............................................................. 834<br />

<strong>The</strong> <strong>Java</strong> <strong>EE</strong> 5<strong>Tutorial</strong> • June 2010

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!