Chapter 8. Security I—execution

  • Introduction—RMI and security managers—Applets—Clients—Servers—System properties—Policy files—Granting AllPermission

In this chapter

So far in this book we have seen how to define a remote interface, and how to construct simple RMI servers and clients. If we want to construct a large RMI application, we need to consider some issues relating to security.

This chapter describes the interaction of RMI and the Java Security Model.[1] For more information about security across networks and secure protocols such as the Secure Sockets Layer, refer to Chapter 16.


The Java Security Model constrains the actions permitted to Java code according to its source—where the code came from. The Security Model is activated ...

Get java.rmi: The Remote Method Invocation Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.