UsefulLinks
Computer Science
Cybersecurity
Java Security
1. Introduction to Java Security
2. The Java Sandbox Architecture
3. Permissions and Security Policies
4. Java Cryptography Architecture
5. Java Cryptography Extension
6. Secure Communication
7. Authentication and Authorization
8. Secure Coding Practices
9. Modern Java Security Features
10. Security Testing and Analysis
7.
Authentication and Authorization
7.1.
JAAS Architecture
7.1.1.
Authentication Framework
7.1.1.1.
Pluggable Authentication
7.1.1.2.
Subject-Based Security
7.1.1.3.
Credential Management
7.1.2.
Core Components
7.1.2.1.
Subject Class
7.1.2.2.
Principal Interface
7.1.2.3.
Credential Management
7.1.3.
Authentication Process
7.1.3.1.
Login Context
7.1.3.2.
Login Modules
7.1.3.3.
Callback Handlers
7.1.3.4.
Authentication States
7.2.
Subject and Principal Management
7.2.1.
Subject Identity
7.2.1.1.
Principal Association
7.2.1.2.
Credential Storage
7.2.1.3.
Subject Delegation
7.2.2.
Principal Types
7.2.2.1.
User Principals
7.2.2.2.
Group Principals
7.2.2.3.
Role Principals
7.2.3.
Credential Types
7.2.3.1.
Public Credentials
7.2.3.2.
Private Credentials
7.2.3.3.
Credential Lifecycle
7.3.
Login Modules
7.3.1.
Login Module Interface
7.3.1.1.
Authentication Phases
7.3.1.2.
Module Configuration
7.3.1.3.
Module Chaining
7.3.2.
Standard Login Modules
7.3.2.1.
Krb5LoginModule
7.3.2.2.
JndiLoginModule
7.3.2.3.
KeyStoreLoginModule
7.3.3.
Custom Login Modules
7.3.3.1.
Implementation Guidelines
7.3.3.2.
Configuration Options
7.3.3.3.
Error Handling
7.4.
JAAS Configuration
7.4.1.
Configuration Files
7.4.1.1.
File Format
7.4.1.2.
Module Specifications
7.4.1.3.
Configuration Options
7.4.2.
Programmatic Configuration
7.4.2.1.
Configuration Providers
7.4.2.2.
Dynamic Configuration
7.4.3.
Authentication Policies
7.4.3.1.
Required Modules
7.4.3.2.
Optional Modules
7.4.3.3.
Sufficient Modules
7.5.
Authorization Integration
7.5.1.
Principal-Based Authorization
7.5.2.
Permission Mapping
7.5.3.
Access Control Decisions
Previous
6. Secure Communication
Go to top
Next
8. Secure Coding Practices