Managing Security Maps ............................................................................................................. 87
▼
To Delete a Connector Connection Pool .................................................................................. 87
▼
To Set Up EIS Access ................................................................................................................... 88
Managing Connector Resources ....................................................................................................... 88
▼
To Create a Connector Resource ............................................................................................... 88
▼
To Edit a Connector Resource .................................................................................................... 89
▼
To Delete a Connector Resource ................................................................................................ 89
▼
To Configure the Connector Service ......................................................................................... 90
Managing Administered Object Resources ...................................................................................... 90
▼
To Create an Administered Object Resource ........................................................................... 91
▼
To Edit an Administered Object Resource ............................................................................... 92
▼
To Delete an Administered Object Resource ........................................................................... 92
8
Web and EJB Containers
..................................................................................................................... 93
The SIP Servlet Container .................................................................................................................. 93
Editing the Properties of the SIP Container .............................................................................. 94
The Web Container ............................................................................................................................. 95
The EJB Container .............................................................................................................................. 95
9
Configuring Security
...........................................................................................................................97
Understanding Application and System Security ............................................................................ 97
Tools for Managing Security .............................................................................................................. 98
Managing Security of Passwords ....................................................................................................... 99
Encrypting a Password in the
domain.xml
File ........................................................................ 99
Protecting Files with Encoded Passwords ............................................................................... 100
Changing the Master Password ................................................................................................ 100
Working with the Master Password and Keystores ............................................................... 101
Changing the Admin Password ................................................................................................ 101
About Authentication and Authorization ...................................................................................... 102
Authenticating Entities ............................................................................................................. 102
Authorizing Users ...................................................................................................................... 103
Specifying JACC Providers ....................................................................................................... 103
Auditing Authentication and Authorization Decisions ........................................................ 103
Configuring Message Security .................................................................................................. 104
Understanding Users, Groups, Roles, and Realms ........................................................................ 104
Contents
Sun GlassFish Enterprise Server 2.1 Administration Guide • December 2008
6
Содержание Sun GlassFish Enterprise Server 2.1
Страница 12: ...12 ...
Страница 13: ...Figures FIGURE 1 1 Enterprise Server Instance 29 FIGURE 9 1 RoleMapping 105 13 ...
Страница 14: ...14 ...
Страница 18: ...18 ...
Страница 38: ...38 ...
Страница 62: ...62 ...
Страница 96: ...96 ...
Страница 126: ...126 ...
Страница 160: ...160 ...
Страница 214: ...214 ...
Страница 218: ...218 ...
Страница 230: ...230 ...