Useful Links
Computer Science
Cybersecurity
Java Security
1. Introduction to Java Security
2. The Java Sandbox Architecture
3. Permissions and Security Policies
4. Java Cryptography Architecture
5. Java Cryptography Extension
6. Secure Communication
7. Authentication and Authorization
8. Secure Coding Practices
9. Modern Java Security Features
10. Security Testing and Analysis
Authentication and Authorization
JAAS Architecture
Authentication Framework
Pluggable Authentication
Subject-Based Security
Credential Management
Core Components
Subject Class
Principal Interface
Credential Management
Authentication Process
Login Context
Login Modules
Callback Handlers
Authentication States
Subject and Principal Management
Subject Identity
Principal Association
Credential Storage
Subject Delegation
Principal Types
User Principals
Group Principals
Role Principals
Credential Types
Public Credentials
Private Credentials
Credential Lifecycle
Login Modules
Login Module Interface
Authentication Phases
Module Configuration
Module Chaining
Standard Login Modules
Krb5LoginModule
JndiLoginModule
KeyStoreLoginModule
Custom Login Modules
Implementation Guidelines
Configuration Options
Error Handling
JAAS Configuration
Configuration Files
File Format
Module Specifications
Configuration Options
Programmatic Configuration
Configuration Providers
Dynamic Configuration
Authentication Policies
Required Modules
Optional Modules
Sufficient Modules
Authorization Integration
Principal-Based Authorization
Permission Mapping
Access Control Decisions
Previous
6. Secure Communication
Go to top
Next
8. Secure Coding Practices