Sun Microsystems GlassFish Enterprise Server 2.1 Administration Manual page 7

Hide thumbs Also See for GlassFish Enterprise Server 2.1:
Table of Contents

Advertisement

Users ............................................................................................................................................ 105
Groups ......................................................................................................................................... 105
Roles ............................................................................................................................................ 106
Realms ......................................................................................................................................... 106
Introduction to Certificates and SSL ............................................................................................... 108
About Digital Certificates ......................................................................................................... 108
About Secure Sockets Layer ...................................................................................................... 109
About Firewalls .................................................................................................................................. 111
About Certificate Files ....................................................................................................................... 111
Changing the Location of Certificate Files .............................................................................. 112
Using Java Secure Socket Extension (JSSE) Tools ......................................................................... 112
Using the keytool Utility ........................................................................................................... 112
Generating a Certificate Using the keytool Utility ............................................................... 114
Signing a Digital Certificate Using the keytool Utility ......................................................... 115
Deleting a Certificate Using the keytool Utility .................................................................... 115
Using Network Security Services (NSS) Tools ............................................................................... 116
Using the certutil Utility ....................................................................................................... 117
Importing and Exporting Certificates Using the pk12util Utility ...................................... 118
Adding and Deleting PKCS11 Modules using modutil ........................................................ 119
Using Hardware Crypto Accelerator With Enterprise Server ..................................................... 120
About Configuring Hardware Crypto Accelerators .............................................................. 120
Configuring PKCS#11 Tokens ................................................................................................. 121
Managing Keys And Certificates .............................................................................................. 122
Configuring J2SE 5.0 PKCS#11 Providers .............................................................................. 124
10
Configuring Message Security ........................................................................................................127
Overview of Message Security .......................................................................................................... 127
Understanding Message Security in the Enterprise Server .......................................................... 128
Assigning Message Security Responsibilities .......................................................................... 128
About Security Tokens and Security Mechanisms ................................................................. 129
Glossary of Message Security Terminology ............................................................................ 131
Securing a Web Service ..................................................................................................................... 132
Configuring Application-Specific Web Services Security ..................................................... 133
Securing the Sample Application ..................................................................................................... 133
Configuring the Enterprise Server for Message Security .............................................................. 133
Contents
7

Advertisement

Table of Contents
loading

Table of Contents