28. Introduction to Security in Java EEThis and subsequent chapters discuss how to address security requirements in Java EE, web, and web services applications. Every enterprise that has sensitive resources that can be accessed by many users, or resources that traverse unprotected, open, networks, such as the Internet, needs to be protected. This chapter introduces basic security concepts and security implementation mechanisms. More information on these concepts and mechanisms can be found in the Security chapter of the Java EE 5 specification. This document is available for download online at the following URL: http://www.jcp.org/en/jsr/detail?id=244 Other chapters in this tutorial that address security requirements include the following:
Some of the material in this chapter assumes that you understand basic security concepts. To learn more about these concepts, we recommend that you explore the Java SE security web site before you begin this chapter. The URL for this site is: http://java.sun.com/j2se/1.5.0/docs/guide/security/index.html This tutorial assumes deployment onto the Sun Java System Application Server (hereafter, Application Server) and provides some information regarding configuration of the Application Server. The best source for information regarding configuration of the Application Server, however, is the Application Server Administration Guide. The best source for development tips specific to the Application Server is the Application Server Developer's Guide. The best source for tips on deploying applications to the Application Server is the Application Server Application Deployment Guide. |