Book Image

GlassFish Administration

By : Xuekun Kou
Book Image

GlassFish Administration

By: Xuekun Kou

Overview of this book

To build a powerful production environment for your Java EE systems, you need a great application server, and the skills to manage it. This book gives you all that you are looking for. This book will help you gain the necessary skills to install, configure, tune, and troubleshoot GlassFish so that you can fully unleash its power. It will teach you how to use the GlassFish application server, with a special focus on administration tasks. It presents the GlassFish administrative tasks in a logical sequence, with each chapter focusing on a specific topic. Starting with installation and moving through configuration, this book takes a careful look at the administration console so that you get a complete understanding of GlassFish and its administrative features. It will help you understand how to deploy Java EE, Ruby on Rails and other supported applications to GlassFish, and how to configure the necessary resources for these applications. You will also learn how to maintain, tune, and troubleshoot your GlassFish server. Also includes a bonus chapter introducing Glassfish v3.
Table of Contents (17 chapters)
GlassFish Administration
Credits
About the Author
Acknowledgement
About the Reviewers
Preface

Configuring certificates and secure communication protocols


Digital certificates enable secure and confidential communication between two entities. There are different kinds of certificates. Personal certificates are used by individuals. Server certificates are used to establish secure sessions between the server and clients through secure sockets layer (SSL) technology.

Digital certificates are typically issued by a trusted third party called a Certification Authority (CA), such as VeriSign. Once a CA has issued a certificate, the holder can present it as proof of identity and to establish encrypted, confidential communications. In addition to the public key, a certificate typically includes information such as the following:

  • The name of the holder and other identification, such as the URL of the web server using the certificate, or an individual's e-mail address

  • The name of the CA that issued the certificate

  • An expiration date

Most common server products and client applications are typically...