Book Image

GlassFish Administration

By : Xuekun Kou
Book Image

GlassFish Administration

By: Xuekun Kou

Overview of this book

To build a powerful production environment for your Java EE systems, you need a great application server, and the skills to manage it. This book gives you all that you are looking for. This book will help you gain the necessary skills to install, configure, tune, and troubleshoot GlassFish so that you can fully unleash its power. It will teach you how to use the GlassFish application server, with a special focus on administration tasks. It presents the GlassFish administrative tasks in a logical sequence, with each chapter focusing on a specific topic. Starting with installation and moving through configuration, this book takes a careful look at the administration console so that you get a complete understanding of GlassFish and its administrative features. It will help you understand how to deploy Java EE, Ruby on Rails and other supported applications to GlassFish, and how to configure the necessary resources for these applications. You will also learn how to maintain, tune, and troubleshoot your GlassFish server. Also includes a bonus chapter introducing Glassfish v3.
Table of Contents (17 chapters)
GlassFish Administration
Credits
About the Author
Acknowledgement
About the Reviewers
Preface

Reviewing essential security concepts


In this section, let's first consider some common security concerns, and some important concepts associated with them. These concepts are essential for understanding the security model implemented in GlassFish.

Authentication

Authentication refers to the mechanism by which communicating entities (users, servers, or application components) prove to one another that they are who they claim they are.

Authentication is typically based on authentication realms, or realms for short. A realm typically contains many users (also known as security principals) and their security credentials. Users contained in a realm can be authenticated based on their credentials, such as the username and password. Users defined in a realm may be assigned to groups. Examples of authentication realms include Lightweight Directory Access Protocol (LDAP) servers and relational database tables.

Authorization

Authorization refers to the mechanism to restrict access to applications...