O'Reilly logo

java.rmi: The Remote Method Invocation Guide by Kathleen McNiff, Esmond Pitt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16. Security II—the conversation

  • Identity—Integrity—Privacy—Secure Sockets Layer—LDAP authentication —JAAS—The RMI Security Extension—Exercises

In this chapter

Chapter 8 was concerned with permissions granted to code.

This chapter is concerned with two further aspects of security: permissions granted to users, and the security of the network conversation itself. This involves several topics:

  • the identity of each party to the conversation

  • the integrity of the message

  • the privacy of the conversation.

Identity

Security concerns the identity of each party to the conversation, in two distinct ways:

  • authentication

  • authorization.

Authentication

We would like each end of a conversation to be able to authenticate itself—prove its identity—to the other end. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required