Skip to Content
Java Security, 2nd Edition
book

Java Security, 2nd Edition

by Scott Oaks
May 2001
Intermediate to advanced
618 pages
20h 50m
English
O'Reilly Media, Inc.
Content preview from Java Security, 2nd Edition

A Key Management Example

Now we’ll proceed to a framework for enterprise-wide key management. Figure 10-1 shows the role of the keystore in the creation and execution of a signed jar file. Thejarsigner utility consults the keystore for the private key of the entity that is signing the jar file. Once the signed jar file is produced, it is placed on a web server, where it can be downloaded into an appletviewer or the Java Plug-in. When the jar file is read on the remote system, the keystore is consulted in order to retrieve the public key of the entity that signed the jar file so that the jar file’s signature can be verified.

the keytool database in a signed JAR file

Figure 10-1. the keytool database in a signed JAR file

Note that the two keystores in this example are (probably) separate files on separate machines. They probably have completely different entries as well -- even for the entry that represents the signer. The signer’s entry in her own database must have the private key of the signer while the signer’s entry in the user’s database needs only a certificate for the signer. However, the keystore could (in this and all examples) be a shared database.

Since access to the private key of the signer is protected by a password, the signer and the end user are able to share a single database without concern that the end user may obtain access to the signer’s private key (assuming that she keeps her password secret, of course). ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Java Security Handbook

Java Security Handbook

Jamie Jaworski, Paul J. Perrone, Venkata S.R. Krishna Chaganti
Java Cryptography

Java Cryptography

Jonathan Knudsen

Publisher Resources

ISBN: 0596001576Errata Page