O'Reilly logo

GlassFish Security by Masoud Kalali

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Securing GlassFish

In the previous chapter we discussed how we should protect the environment from malicious applications, which a user may deploy into our server. We discussed the security of GlassFish installation at the operating system level by using GlassFish exclusive user, filesystem, and network interfaces. In this chapter we will discuss GlassFish security from another perspective—the administration and applications security.

  • Overviewing of GlassFish administration
  • Learning GlassFish administration security
  • Protecting passwords used in GlassFish
  • Securing different network listeners
  • Using Virtual Server for isolating applications
  • Using cross context SSO available in GlassFish

Administrating GlassFish

GlassFish benefits from several ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required