Chapter 15. Security Considerations for Container Providers
Any sound specification should be backed by a solid implementation that adheres to the specification; is secure, reliable, and administrable; and performs well. A J2EE container implementation should provide these qualities while adhering to the J2EE specification. This chapter discusses security considerations that a container provider should take into account while designing and implementing a J2EE container. This chapter also provides an approach to implementing a container runtime by making use of available technologies, including Java security technologies. For example, authentication, authorization, and delegation facilities within a J2EE container can be implemented based on existing ...
Get Enterprise Java™ Security: Building Secure J2EE™ Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.