Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellFunctions of a security managerA security manager is a class that allows a program to implement a security policy that checks the access rights of resources that need to be protected and other operational permissions that it requires to protect the system from m
Java is a type-safe language that has four types of security mechanisms known as the security sandbox mechanism to guarantee the security of the language, and these four types of security sandboxes are:
.class File verifier
Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellThe simple Authentication and Security layer (SASL) defines a protocol for authentication and the creation of a security layer between client and server applications, where the establishment of the security layer is optional. SASL defines how authentication data
authorizationsJars authorization enhances the Java security model by adding access control mechanisms based on users, groups, and roles. It allows setting withUser-level and operation-level permissions to enforce access control for code performers. The subject object created during the authentication process represents an authenticated entity. Subject objects typically contain a set of principal, where eac
--Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellInstalling Java SASLSASL security providers provide implementations of the SASL mechanism, and each provider implementation may support one or more SASL mechanisms that can be registered with JCA. In J2SE 5.0, the default method automatically registers the SUNSASL provider as a JCA provider in the
Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellA JCA provider Class 1.1 Java.security.ProviderThe provider class provides implementation of Java security and inherits the properties class to ensure that the program has sufficient permissions to perform related operations. Provides an internal class servicethat encapsulates the properties of a service.
providers, which are placed in front of the SUNJCE provider to use them.The default SUNJCE provider provides the following features:
Implement the SSL3.0 and TLS1.0 protocols.
Implements the ssl/i ' LS state machine (sslengine), which allows the processing of buffer data to generate ssl/i ' LS encoded data(J2SE 5.0 and later).
Implements the key factory and key generator used to support the RSA algorithm.
Implement the most common SSL and TLS cryptographic algorithm suite t
Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwell
Javax.net. ': Contains a set of core classes and interfaces for creating basic client and server sockets.
Javax. Net. SSL.,: Contains a set of core classes and interfaces for creating secure client and server SSL sockets and for secure httpurl connections.
Javax. Security. The Cert.,:java
(). Before you call Wrap () unwrap () or beginhandshake (), you must set all configuration parameters. All of these methods trigger the first handshake. The movement of data through the engine is done by calling Wrap () (outbound data) or unwrap () (inbound data). Depending on the state of Sslengine, The Wrap () call may consume application data from the source buffer and may also generate network data in the destination buffer. Outbound data may contain application data and/or handshake data.
Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellJCP (Java certpath) is a Java certificate path that integrates the functionality of certificate checking, verification, and validation for your application. Features include the following:
Interpreting and managing certificates
Certificate Revocation List
Certificate path
The JCP API implemen
system-level access control policy that is used to authorize based on an authenticated principal.3.2 javax.security.auth.AuthPermissionAuthpernussion (Authorization class, javax.security.auth.AuthPermission): Encapsulates the basic permissions required for Jaas authorization, and controls the object policy, Subject; Access to LoginContext and configuration.3.3 Javax.security.auth.PrivateCreclentialsPermissionPrivatecredenti address Pang Xia Jia rission (private credential permission class, java
Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellA Java Gss-apiJava GSS-API classes and interfaces are located in the. Org.ietf.jgss. ' Package, the package is part of J2SE 1.4.1.1 org.ietf.jgss.channelbinding1.2 org.ietf.jgss.gsscontext1.3 org.ietf.jgss.gsscredential1.4 org.ietf.jgss.gssexception1.5 org.ietf.jgss.gssmanager1.6 org.ietf.jgss.gssname1.7 org.ietf.jgss.MessageProp1.8 Org.ietf.jgss.Oid
Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellIn J2SE, the JCP API is an extension of JCA, located in the java.security.cert.* package.Java.security.cert.CertPathThe Certpath (certificate path Class) defines an abstract class that represents a certificate chain and a certificate path, and defines all the features associated with the certificate path object.Java.security.cert.CertificateFactoryThe Certificatefactory (Certificate factory Cla
Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellOne JCE provider classJCE uses the provider class for JCA.Two JCE engine class 2.1 Javax.crypto.CipherThe Cipher (Cryptographic algorithm Class) provides encryption and decryption capabilities for cryptographic algorithms.2.2 Javax.crypto.CipherInputStreamSafe flow.2.3 Javax.crypto.MacThe Mac class provides algorithmic functionality to check the integrity of messages transmitted over the networ
Talking about security, such as now on the market some OAuth2 \ Oidc-openid Connect, identity authentication, authorization, and so on, the following first Java SecurityThis piece of stuff is a lot more complicated than spring Security or. Netcore Security, 1.1-point comparison noteSpring SecurityPart:Securitycontextho
Java has three main features: platform independence, network mobility, and security. The Java architecture provides powerful support and assurance for these three features, this article focuses on the principles and usage of the Java architecture to support information security
Java thread security, java thread
I have encountered a lot of questions about thread security recently, such:
Synchronized andWhat is the difference between volatile and volatile?
What is the difference between StringBuilder and StringBuffer?
What is the difference between HashMap and HashTable?And so on ......
The
Overview
Java serialization serialization, we should be not unfamiliar. Its main function is to transform the state of an object into a sequence of bytes to facilitate the persistence of objects or network transmission. The reverse is the reverse process of deserialization. All the developers have to do is implement the Serializable interface and then call the Objectoutputstream/objectinputstream Writeobject/readobject method, and the other work JVM
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.