O'Reilly logo

java.rmi: The Remote Method Invocation Guide by Kathleen McNiff, Esmond Pitt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Security I—execution

  • Introduction—RMI and security managers—Applets—Clients—Servers—System properties—Policy files—Granting AllPermission

In this chapter

So far in this book we have seen how to define a remote interface, and how to construct simple RMI servers and clients. If we want to construct a large RMI application, we need to consider some issues relating to security.

This chapter describes the interaction of RMI and the Java Security Model.[1] For more information about security across networks and secure protocols such as the Secure Sockets Layer, refer to Chapter 16.

Introduction

The Java Security Model constrains the actions permitted to Java code according to its source—where the code came from. The Security Model is activated ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required