O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication and Authorization

An important aspect of computer security is the ability of a program to enforce ownership of resources and access rules on actions involving these resources. This is accomplished by making sure that a program is used or invoked only after a human or program user has supplied its identity and has proved the ownership of this identity. This process of authentication is central for computer security. Although there are many different ways to perform authentication, in a majority of cases it is accomplished with the help of a username and password. A password is the shared secret between the user and the program.

A wide variety of solutions are in use for username and password validation—ranging from custom user databases ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required