Chapter 16. Security II—the conversation
Identity—Integrity—Privacy—Secure Sockets Layer—LDAP authentication —JAAS—The RMI Security Extension—Exercises
In this chapter
Chapter 8 was concerned with permissions granted to code.
This chapter is concerned with two further aspects of security: permissions granted to users, and the security of the network conversation itself. This involves several topics:
the identity of each party to the conversation
the integrity of the message
the privacy of the conversation.
Identity
Security concerns the identity of each party to the conversation, in two distinct ways:
authentication
authorization.
Authentication
We would like each end of a conversation to be able to authenticate itself—prove its identity—to the other end. ...
Get java.rmi: The Remote Method Invocation Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.