|  | | Conceptual overview
1. Authentication and authorization
2. Elements of authentication
3. Elements of authorization
4. Protecting users and code from each other
5. Pluggable authentication modules
6. JAAS example and diagram
7. JAASExample flow of operations
|