O'Reilly logo

Sams Teach Yourself J2EE™ in 21 Days by Peter Roxburgh, Andy Longshaw, Debbie Law, Dan Haywood, Martin Bond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Day 15. Security

So far, you have developed your J2EE application without considering security. Now you will look at how to add security constraints to your system to prevent loss of privacy or to keep unauthorized clients from accessing data and causing accidental or malicious damage.

In today's lesson, you will look at

  • How the J2EE specification supports the common requirements for a secure system

  • The common terminology used when discussing system security

  • Symmetric and asymmetric encryption

  • Securing a J2EE application using principals and roles

  • Using declarative security for EJBs and Web pages

  • Using programmatic security in EJBs and Web pages

  • Supplying security credentials to an LDAP naming service provider for JNDI

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required