O'Reilly logo

Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition by Mary Dageforde, Gary Ellison, Li Gong

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8.5. Distributed End-Entity Authentication

With the increasing use of distributed systems, users need to access resources that are often remote. Traditionally, users have had to sign on to multiple systems, each of which may involve different identities and authentication technologies. In contrast, with single sign-on, the user needs to authenticate only once, and the authenticated identity is securely carried across the network to access resources on behalf of the subject.

The Java 2 platform supplies rich APIs that, when used in conjunction with the authentication framework, integrate with standard distributed environments. An example in J2SE is a LoginModule implementing the Kerberos V5 protocol, com.sun.security.auth.module.Krb5LoginModule ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required