Chapter 16. Security II—the conversation

  • Identity—Integrity—Privacy—Secure Sockets Layer—LDAP authentication —JAAS—The RMI Security Extension—Exercises

In this chapter

Chapter 8 was concerned with permissions granted to code.

This chapter is concerned with two further aspects of security: permissions granted to users, and the security of the network conversation itself. This involves several topics:

  • the identity of each party to the conversation

  • the integrity of the message

  • the privacy of the conversation.


Security concerns the identity of each party to the conversation, in two distinct ways:

  • authentication

  • authorization.


We would like each end of a conversation to be able to authenticate itself—prove its identity—to the other end. ...

Get java.rmi: The Remote Method Invocation Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.