Assign a security role to users in the realm.
To assign a security role to a user, add a
security-role-mapping
element to the deployment
descriptor that you modified in
Step 4
.
The following example shows a
security-role-mapping
element that assigns the security role
Employee
to user
Calvin
.
<security-role-mapping>
<role-name>Employee</role-name>
<principal-name>Calvin</principal-name>
</security-role-mapping>
Introduction to Certificates and SSL
The following topics are discussed in this section:
■
“About Digital Certificates” on page 108
■
“About Secure Sockets Layer” on page 109
About Digital Certificates
Digital certificates
(or simply certificates) are electronic files that uniquely identify people and
resources on the Internet. Certificates also enable secure, confidential communication between
two entities.
There are different kinds of certificates, such as personal certificates, used by individuals, and
server certificates, used to establish secure sessions between the server and clients through
secure sockets layer (SSL) technology. For more information on SSL, see
“About Secure Sockets
Layer” on page 109
.
Certificates are based on
public key cryptography
, which uses pairs of digital
keys
(very long
numbers) to
encrypt
, or encode, information so it can be read only by its intended recipient. The
recipient then
decrypts
(decodes) the information to read it.
A key pair contains a public key and a private key. The owner distributes the public key and
makes it available to anyone. But the owner never distributes the private key; it is always kept
secret. Because the keys are mathematically related, data encrypted with one key can be
decrypted only with the other key in the pair.
A certificate is like a passport: it identifies the holder and provides other important information.
Certificates are issued by a trusted third party called a
Certification Authority
(CA). The CA is
analogous to passport office: it validates the certificate holder's identity and signs the certificate
so that it cannot be forged or tampered with. Once a CA has signed a certificate, the holder can
present it as proof of identity and to establish encrypted, confidential communications.
5
Introduction to Certificates and SSL
Sun GlassFish Enterprise Server 2.1 Administration Guide • December 2008
108
Содержание Sun GlassFish Enterprise Server 2.1
Страница 12: ...12 ...
Страница 13: ...Figures FIGURE 1 1 Enterprise Server Instance 29 FIGURE 9 1 RoleMapping 105 13 ...
Страница 14: ...14 ...
Страница 18: ...18 ...
Страница 38: ...38 ...
Страница 62: ...62 ...
Страница 96: ...96 ...
Страница 126: ...126 ...
Страница 160: ...160 ...
Страница 214: ...214 ...
Страница 218: ...218 ...
Страница 230: ...230 ...