Logo 
Search:

Java Answers

Ask Question   UnAnswered
Home » Forum » Java       RSS Feeds
  Question Asked By: Hayrah Burki   on Oct 30 In Java Category.

  
Question Answered By: Tyrone Sanchez   on Oct 30

For a secure environment, its not enough to implement  only authentication  and authorization. you need a secure protocol to perform encryptions, tunnelling and transaction monitoring.

Depending on your remote connectivity nature use protocols like HTTPS, SSL and ofcourse perform whatever cryptography, key signature and certification methods you have handy.

Aside from JAAS (which provides necessary functionality), you need to implement secure network topology. (for this read through how to setup firewalls and become familiar with firewalls and DMZ combinations.

J2EE security  blueprint is a good place to start.

Share: 

 

This Question has 7 more answer(s). View Complete Question Thread

 
Didn't find what you were looking for? Find more on Web Applications Security and Enterprise Java Or get search suggestion and latest updates.


Tagged: