< Day Day Up > |
Within a J2EE environment, the security server is the primary user of the JCA to validate signatures on transactions and certificates. However, all primary and secondary objects within the J2EE environment can make use of the capabilities of the JCA and the JCE. For example, an enterprise bean could sign data using a java.security.Signature instance or encrypt data using a javax.crypto.Cipher instance. The JCA and JCE play a fundamental role to any Java application that implements secret- or public-key security. |
< Day Day Up > |