Chapter 8. Security I—execution

  • Introduction—RMI and security managers—Applets—Clients—Servers—System properties—Policy files—Granting AllPermission

In this chapter

So far in this book we have seen how to define a remote interface, and how to construct simple RMI servers and clients. If we want to construct a large RMI application, we need to consider some issues relating to security.

This chapter describes the interaction of RMI and the Java Security Model.[1] For more information about security across networks and secure protocols such as the Secure Sockets Layer, refer to Chapter 16.

Introduction

The Java Security Model constrains the actions permitted to Java code according to its source—where the code came from. The Security Model is activated ...

Get java.rmi: The Remote Method Invocation Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.