Sun Microsystems GLASSFISH ENTERPRISE 820433510 User Manual

Page 6

Advertising
background image

Managing Security Maps ............................................................................................................. 87

▼ To Delete a Connector Connection Pool .................................................................................. 87
▼ To Set Up EIS Access ................................................................................................................... 88

Managing Connector Resources ....................................................................................................... 88

▼ To Create a Connector Resource ............................................................................................... 88
▼ To Edit a Connector Resource .................................................................................................... 89
▼ To Delete a Connector Resource ................................................................................................ 89
▼ To Configure the Connector Service ......................................................................................... 90

Managing Administered Object Resources ...................................................................................... 90

▼ To Create an Administered Object Resource ........................................................................... 91
▼ To Edit an Administered Object Resource ............................................................................... 92
▼ To Delete an Administered Object Resource ........................................................................... 92

8

Web and EJB Containers

..................................................................................................................... 93

The SIP Servlet Container .................................................................................................................. 93

Editing the Properties of the SIP Container .............................................................................. 94

The Web Container ............................................................................................................................. 95

The EJB Container .............................................................................................................................. 95

9

Configuring Security

...........................................................................................................................97

Understanding Application and System Security ............................................................................ 97

Tools for Managing Security .............................................................................................................. 98

Managing Security of Passwords ....................................................................................................... 99

Encrypting a Password in the domain.xml File ........................................................................ 99

Protecting Files with Encoded Passwords ............................................................................... 100

Changing the Master Password ................................................................................................ 100

Working with the Master Password and Keystores ............................................................... 101

Changing the Admin Password ................................................................................................ 101

About Authentication and Authorization ...................................................................................... 102

Authenticating Entities ............................................................................................................. 102

Authorizing Users ...................................................................................................................... 103

Specifying JACC Providers ....................................................................................................... 103

Auditing Authentication and Authorization Decisions ........................................................ 103

Configuring Message Security .................................................................................................. 104

Understanding Users, Groups, Roles, and Realms ........................................................................ 104

Contents

Sun GlassFish Enterprise Server 2.1 Administration Guide • December 2008

6

Advertising