O'Reilly logo

J2EE™ and Beyond: Design, Develop, and Deploy World-Class Java™ Software by Art Taylor

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Application Execution

Executing the application returns differing results depending on the user who was authenticated since different users (and their subjects) have different permissions.

As we saw in this chapter, the JAAS package is by design highly configurable. The JAAS configuration file for the execution of our demonstration program is as follows.

The DemoJAAS Configuration File
TextJAAS {
       DemoLoginModule required debug=true;
};

TestJAAS {
       DemoLoginModule required debug=true;
};

DemoJAAS {
       com.sun.security.auth.module.UnixLoginModule required debug=true;
};

JDBCJAAS {
       JDBCLoginModule required ;
};

Each of these LoginModule configurations is referenced and used in the DemoJAAS program as arguments to the LoginContext constructor.

In ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required