This chapter offered a tour of the Java extensible security architecture and its core API technologies that contribute to building an end-to-end security infrastructure for Java-based application solutions. We studied the various Java security API technologies that provide support for the following:
We also looked at the security enhancements available from J2SE 5.0. In particular, we looked at the API mechanisms and programming techniques of the following Java extensible security technologies:
It is important to know these technologies, because they serve as the foundation for delivering end-to-end security to Java-based applications and Web services. In the next chapter, we will explore the security techniques and mechanisms available for securing J2EE-based applications and Web services. |