beautypg.com

Sun Microsystems GLASSFISH ENTERPRISE 820433510 User Manual

Page 7

background image

Users ............................................................................................................................................ 105

Groups ......................................................................................................................................... 105

Roles ............................................................................................................................................ 106

Realms ......................................................................................................................................... 106

Introduction to Certificates and SSL ............................................................................................... 108

About Digital Certificates ......................................................................................................... 108

About Secure Sockets Layer ...................................................................................................... 109

About Firewalls .................................................................................................................................. 111

About Certificate Files ....................................................................................................................... 111

Changing the Location of Certificate Files .............................................................................. 112

Using Java Secure Socket Extension (JSSE) Tools ......................................................................... 112

Using the keytool Utility ........................................................................................................... 112

Generating a Certificate Using the keytool Utility ............................................................... 114

Signing a Digital Certificate Using the keytool Utility ......................................................... 115

Deleting a Certificate Using the keytool Utility .................................................................... 115

Using Network Security Services (NSS) Tools ............................................................................... 116

Using the certutil Utility ....................................................................................................... 117

Importing and Exporting Certificates Using the pk12util Utility ...................................... 118

Adding and Deleting PKCS11 Modules using modutil ........................................................ 119

Using Hardware Crypto Accelerator With Enterprise Server ..................................................... 120

About Configuring Hardware Crypto Accelerators .............................................................. 120

Configuring PKCS#11 Tokens ................................................................................................. 121

Managing Keys And Certificates .............................................................................................. 122

Configuring J2SE 5.0 PKCS#11 Providers .............................................................................. 124

10

Configuring Message Security

........................................................................................................127

Overview of Message Security .......................................................................................................... 127

Understanding Message Security in the Enterprise Server .......................................................... 128

Assigning Message Security Responsibilities .......................................................................... 128

About Security Tokens and Security Mechanisms ................................................................. 129

Glossary of Message Security Terminology ............................................................................ 131

Securing a Web Service ..................................................................................................................... 132

Configuring Application-Specific Web Services Security ..................................................... 133

Securing the Sample Application ..................................................................................................... 133

Configuring the Enterprise Server for Message Security .............................................................. 133

Contents

7