Sun Microsystems GlassFish Enterprise Server 2.1 Administration Manual page 6

Hide thumbs Also See for GlassFish Enterprise Server 2.1:
Table of Contents

Advertisement

Contents
▼ To Delete a Connector Connection Pool .................................................................................. 87
▼ To Set Up EIS Access ................................................................................................................... 88
Managing Connector Resources ....................................................................................................... 88
▼ To Create a Connector Resource ............................................................................................... 88
▼ To Edit a Connector Resource .................................................................................................... 89
▼ To Delete a Connector Resource ................................................................................................ 89
▼ To Configure the Connector Service ......................................................................................... 90
Managing Administered Object Resources ...................................................................................... 90
▼ To Create an Administered Object Resource ........................................................................... 91
▼ To Edit an Administered Object Resource ............................................................................... 92
▼ To Delete an Administered Object Resource ........................................................................... 92
8
Web and EJB Containers ..................................................................................................................... 93
The SIP Servlet Container .................................................................................................................. 93
The Web Container ............................................................................................................................. 95
The EJB Container .............................................................................................................................. 95
9
Configuring Security ...........................................................................................................................97
Understanding Application and System Security ............................................................................ 97
Tools for Managing Security .............................................................................................................. 98
Managing Security of Passwords ....................................................................................................... 99
About Authentication and Authorization ...................................................................................... 102
Understanding Users, Groups, Roles, and Realms ........................................................................ 104
6
Sun GlassFish Enterprise Server 2.1 Administration Guide • December 2008
Managing Security Maps ............................................................................................................. 87
Editing the Properties of the SIP Container .............................................................................. 94
Encrypting a Password in the domain.xml File ........................................................................ 99
Protecting Files with Encoded Passwords ............................................................................... 100
Changing the Master Password ................................................................................................ 100
Working with the Master Password and Keystores ............................................................... 101
Changing the Admin Password ................................................................................................ 101
Authenticating Entities ............................................................................................................. 102
Authorizing Users ...................................................................................................................... 103
Specifying JACC Providers ....................................................................................................... 103
Auditing Authentication and Authorization Decisions ........................................................ 103
Configuring Message Security .................................................................................................. 104

Advertisement

Table of Contents
loading

Table of Contents