Security is vital for real-world systems. Management systems are as real-world as they come, so securing management applications is essential. Unfortunately, getting security "right" is a difficult, generally thankless, task. This chapter has covered some of the JMX security basics by examining the exposures that attackers might exploit and discussing the security features provided by MX4J. The complicated task of putting those features to work in policies that make sense for a particular application is an exercise left to the reader. |