Skip to main content
IBM  
Shop Support Downloads
IBM Home Products Consulting Industries News About IBM
IBM developerWorks : Java : Education - Tutorials
Java security, Part 2: Authentication and authorization
ZIPPDF (letter)PDF (A4)e-mail
Main menuSection menuFeedbackPreviousNext
2. Conceptual overview
  


JAAS example and diagram page 6 of 7


In this tutorial, we will look at code for a JAAS example application, piece by piece. To help keep track of the big picture, the figure below shows how all of these pieces fit together. The running example (main program JAASExample) first authenticates a user using two techniques, or login modules, and then allows or disallows (or authorizes) access to two pieces of sensitive code based on the results of the authentication step.

Here is a diagram of the JAASExample program. The flow of operations is described in the next panel.


Main menuSection menuFeedbackPreviousNext
Privacy Legal Contact