ゞ沉默是金ゞ

鱼离不开水,但是没有说不离开哪滴水.
posts - 98,comments - 104,trackbacks - 0

With the following tutorial, you can create a distributed eXtreme Scale environment in a Java Platform, Standard Edition environment.

Before you begin

Ensure that you are familiar with the basics of a distributed eXtreme Scale configuration.

About this task

In this tutorial, the catalog server, container server, and client all run in a Java SE environment. Each step in the tutorial builds on the previous one. Follow each of the steps to secure a distributed eXtreme Scale and develop a simple Java SE application to access the secured eXtreme Scale.

Begin tutorial

Procedure

  1. Java SE security tutorial - Step 1
    • Start an unsecured catalog server
    • Start an unsecured container server
    • Start a client to access the data
    • Use xsadmin to show map size
    • Stop server
  2. Java SE security tutorial - Step 2
    • Use of CredentialGenerator
    • Use of Authenticator
    • Start a secure catalog server
    • Start a secure container server
    • Start client to access secured ObjectGrid
    • Use xsadmin to show map size
    • Stop secure server
  3. Java SE security tutorial - Step 3
    • Use of JAAS authorization policy
  4. Java SE security tutorial - Step 4
    • Create a key store and trust store
    • Configure SSL properties for the server
    • Configure SSL properties for the client
    • Use xsadmin to show map size
    • Stop secure server
  1. Java SE security tutorial - Step 1
    This topic describes a simple unsecured sample. Additional security features are added incrementally in the steps of the tutorial to increase the amount of integrated security that is available.
  2. Java SE security tutorial - Step 2
    Building on the previous step, the following topic shows how to implement client authentication in a distributed eXtreme Scale environment.
  3. Java SE security tutorial - Step 3
    After authenticating a client, as in the previous step, you can give security privileges through eXtreme Scale authorization mechanisms.
  4. Java SE security tutorial - Step 4
    The following step explains how you can enable a security layer for communication between your environment's endpoints.
posted on 2012-06-26 19:29 ゞ沉默是金ゞ 阅读(798) 评论(0)  编辑  收藏 所属分类: eXtreme

只有注册用户登录后才能发表评论。


网站导航: