O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample Application Using RMI

The base sample application described in Chapter 5, Access Control, simulated a highly simplified banking scenario. This program has the objects representing the bank and the customer accounts in the same JVM as the client-object accessing these bank objects. In this section, we extend this base application so that it is split into the client and server parts and the client uses RMI to interact with the server. Discussion on security aspects of the RMI is deferred till we get comfortable with the basic RMI operation.

The base sample application has interfaces BankIntf, AccountIntf and the corresponding implementation classes Bank and Account. We want to expose these as RMI remote interfaces. This can be achieved by ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required