O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Applying JASS to a Sample Application

We will begin with describing a sample application, identify its authentication and authorization requirements and then use JAAS to add these features. We will be using the same application in subsequent chapters also to illustrate other security concepts. So let us spend some time understanding it.

The Sample Application

The sample application creates a highly simplified banking scenario. It consists of a number of files in %JSTK_HOME%\src\org\jstk\example\bank directory. Table 5-3 lists all the files and has a brief description of each file.

Table 5-3. Sample Application Files
FilenameBrief description
BankIntf.javaInterface to expose bank operations.
AccountIntf.javaInterface to expose operations on a bank ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required