18.7. Security management
The stock quote server example discussed above is not representative of many practical applications, in that it required no authentication. Anyone who knows the hostname and port number can connect and get stock quotes. Practical EISs will require some form of authentication and, very possibly, other security measures as well. These measures may include guarantees of privacy and confidentiality, as discussed in Chapter 16.
This issue is complicated by the fact that there are a great many systems for which we may wish to provide resource adapters, and it would be impossible to set down details of the sign-on procedure in the J2EE Connector Specification. However, just as with JDBC, the Specification recognizes two basic ...
Get Applied Enterprise JavaBeans™ Technology now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.