In this section, we've pulled all of the JAAS authentication and
authorization pieces together to illustrate a complete running JAAS
application. We've also played with several variations to get a
feel for what's really going on under the hood and how flexible this
architecture is for application security.
To expand on what you've learned here, you should continue playing
with JAAS and see what happens when you try different login
configurations. For example, if you have Kerberos running in your
installation, try running the Kerberos login module.