Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS Guida Utente Pagina 11

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 328
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 10
Security System Guide - Table of Contents
xi
Security Measures for Portable-ORB ...........................................................................................2-20
Unauthorized Access to Resource Files..................................................................................2-20
Notes on Communication Data................................................................................................2-20
Notes on Creation and Operation of Java Applet....................................................................2-21
About Authorization Settings ..............................................................................................2-21
About Errors and Exceptions..............................................................................................2-21
Security Measures for Event Service............................................................................................2-22
Unauthorized Access to Resource Files..................................................................................2-22
Security Measures for IJServer Operation ...................................................................................2-23
Unauthorized Access to Resource Files..................................................................................2-23
Notes on IJServer Execution...................................................................................................2-23
Security Measures Concerning Operation of Smart Repository...................................................2-24
About Operation.......................................................................................................................2-24
Blocking External Access.........................................................................................................2-24
Restriction of Services.............................................................................................................2-24
Notes on Accessing the Smart Repository Server ..................................................................2-24
Security Measures for Fujitsu Enabler..........................................................................................2-25
Account Used for Fujitsu Enabler............................................................................................2-25
Measures for Multi server Management.......................................................................................2-26
Security Role Settings .............................................................................................................2-26
Measures for Configuration Manager...........................................................................................2-27
Illegal Access to Resource Files..............................................................................................2-27
Chapter 3 Authentication and Access Control for the Interstage HTTP Server
Types of Authentication...................................................................................................................3-2
User Authentication (Basic Authentication)................................................................................3-2
IP Access Control.......................................................................................................................3-3
Online Collation...............................................................................................................................3-4
Setting the User Authentication ......................................................................................................3-5
Registering a User Password....................................................................................................3-5
Editing the Environment Definition File......................................................................................3-6
Relating Directives.....................................................................................................................3-7
AuthName.............................................................................................................................3-8
AuthType...............................................................................................................................3-8
AuthUserFile.........................................................................................................................3-9
<Directory>...........................................................................................................................3-9
Require ...............................................................................................................................3-10
Setting the IP Access Control .......................................................................................................3-11
Vedere la pagina 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 327 328

Commenti su questo manuale

Nessun commento