Skip to main content
IBM  
Shop Support Downloads
IBM Home Products Consulting Industries News About IBM
IBM developerWorks : Java : Education - Tutorials
Java security, Part 2: Authentication and authorization
ZIPPDF (letter)PDF (A4)e-mail
Main menuSection menuFeedbackNext
5. JAAS example
  


Overview page 1 of 8


Finally, we've come to the fun part of the tutorial: learning by doing. We'll start by running the comprehensive JAASExample application, which contains all of the authentication and authorization mechanisms (and code) we've worked with throughout the tutorial. After running the example and seeing the results of our first configuration, we'll explore some different configuration options, checking the results as we go along. At the end of this final section of the tutorial, you'll have had your first taste of programming in JAAS.


Main menuSection menuFeedbackNext
Privacy Legal Contact