ゞ沉默是金ゞ

          魚離不開水,但是沒有說不離開哪滴水.
          posts - 98,comments - 104,trackbacks - 0

          With the following tutorial, you can create a distributed eXtreme Scale environment in a Java Platform, Standard Edition environment.

          Before you begin

          Ensure that you are familiar with the basics of a distributed eXtreme Scale configuration.

          About this task

          In this tutorial, the catalog server, container server, and client all run in a Java SE environment. Each step in the tutorial builds on the previous one. Follow each of the steps to secure a distributed eXtreme Scale and develop a simple Java SE application to access the secured eXtreme Scale.

          Begin tutorial

          Procedure

          1. Java SE security tutorial - Step 1
            • Start an unsecured catalog server
            • Start an unsecured container server
            • Start a client to access the data
            • Use xsadmin to show map size
            • Stop server
          2. Java SE security tutorial - Step 2
            • Use of CredentialGenerator
            • Use of Authenticator
            • Start a secure catalog server
            • Start a secure container server
            • Start client to access secured ObjectGrid
            • Use xsadmin to show map size
            • Stop secure server
          3. Java SE security tutorial - Step 3
            • Use of JAAS authorization policy
          4. Java SE security tutorial - Step 4
            • Create a key store and trust store
            • Configure SSL properties for the server
            • Configure SSL properties for the client
            • Use xsadmin to show map size
            • Stop secure server
          1. Java SE security tutorial - Step 1
            This topic describes a simple unsecured sample. Additional security features are added incrementally in the steps of the tutorial to increase the amount of integrated security that is available.
          2. Java SE security tutorial - Step 2
            Building on the previous step, the following topic shows how to implement client authentication in a distributed eXtreme Scale environment.
          3. Java SE security tutorial - Step 3
            After authenticating a client, as in the previous step, you can give security privileges through eXtreme Scale authorization mechanisms.
          4. Java SE security tutorial - Step 4
            The following step explains how you can enable a security layer for communication between your environment's endpoints.
          posted on 2012-06-26 19:29 ゞ沉默是金ゞ 閱讀(819) 評論(0)  編輯  收藏 所屬分類: eXtreme
          主站蜘蛛池模板: 辉南县| 改则县| 玛纳斯县| 通渭县| 怀集县| 山东| 台中市| 广灵县| 桦川县| 浮梁县| 滕州市| 丰顺县| 辽宁省| 图们市| 柞水县| 德江县| 峡江县| 金沙县| 古交市| 忻城县| 通榆县| 澄江县| 朝阳市| 天峨县| 股票| 舞阳县| 定日县| 南康市| 孟州市| 富蕴县| 黎城县| 拜泉县| 长春市| 承德县| 元氏县| 关岭| 囊谦县| 广元市| 保靖县| 塔河县| 油尖旺区|