Authentication -security component, JAVA Programming

Authentication is basically an identification step.

Functionality used for J2EE security:

Principal: An entity that may be authenticated and identified.

Principal name: Identity of a principal like user id and password.

Credential: Information like certificate or password, which may authenticate a principal.

Subject: A set of rules and their credentials associated with a thread of execution.

Authentication: The steps by which a server verifies the identity represented by a user through certificate or username/userid and password. E.g: the password and username supplied by the user may be checked against a database server or an LDAP server to verify he is whom he claims to be.

Authentication methods:

Basic/Digest authentication: Browser password and specific is encoded using Base-64 encoding.Digest is same to basic but shielded the password through encryption. This is a simple challenge- respond scheme where the client is challenged for a password and user id. The Internet is broken into realms. 

Form-based authentication: Most Web applications give  the  form-based authentication since it allows applications to modifies the authentication interface. Uses base64 encoding, which may expose password and username unless all connections are over SSL.

Certificate based authentication: Uses SSL and PKI. This is by far the most secured authentication function. A user must give x.509 certificate to verify with the server.


Posted Date: 7/27/2012 6:00:54 AM | Location : United States

Related Discussions:- Authentication -security component, Assignment Help, Ask Question on Authentication -security component, Get Answer, Expert's Help, Authentication -security component Discussions

Write discussion on Authentication -security component
Your posts are moderated
Related Questions
how to Using polymorphism to write a program to display digital clock?

Describe, in general, how java garbage collector works?

Implement Decision Tree Algorithm using Netbeans (Java) & Microsoft Access 2007. "One Level is enough, output should contains gain of each attribute, the selected attribute and

How to get all the registered objects in a rmiregistry? Ans) Using list method of Naming Class.

The Local Systems IP Address and Port Number and the Remote System's IPAddress and Port Number.

Describe the final keyword ? The final keyword is used in various different contexts as a modifier meaning in which what it modifies cannot be changed in a few sense. final c

PS1 emulator for android There is an open source app known as psx4droid i want a developer to solve problems and bugs and doing performance improvement to source code to running

YES. JSP technology is extensible by the development of custom actions, or tags, which are encapsulated in tag libraries. #question..

What is Methods in java explain with an example? Data types aren't much use unless you can do things along with them. For this reasons classes have techniques. Fields say what