So far, you have developed your J2EE application without considering security. Now you will look at how to add security constraints to your system to prevent loss of privacy or to keep unauthorized clients from accessing data and causing accidental or malicious damage.
In today's lesson, you will look at
How the J2EE specification supports the common requirements for a secure system
The common terminology used when discussing system security
Symmetric and asymmetric encryption
Securing a J2EE application using principals and roles
Using declarative security for EJBs and Web pages
Using programmatic security in EJBs and Web pages
Supplying security credentials to an LDAP naming service provider for JNDI
3.146.37.250