ゞ沉默是金ゞ

          魚離不開水,但是沒有說不離開哪滴水.
          posts - 98,comments - 104,trackbacks - 0

          With the following tutorial, you can create a distributed eXtreme Scale environment in a Java Platform, Standard Edition environment.

          Before you begin

          Ensure that you are familiar with the basics of a distributed eXtreme Scale configuration.

          About this task

          In this tutorial, the catalog server, container server, and client all run in a Java SE environment. Each step in the tutorial builds on the previous one. Follow each of the steps to secure a distributed eXtreme Scale and develop a simple Java SE application to access the secured eXtreme Scale.

          Begin tutorial

          Procedure

          1. Java SE security tutorial - Step 1
            • Start an unsecured catalog server
            • Start an unsecured container server
            • Start a client to access the data
            • Use xsadmin to show map size
            • Stop server
          2. Java SE security tutorial - Step 2
            • Use of CredentialGenerator
            • Use of Authenticator
            • Start a secure catalog server
            • Start a secure container server
            • Start client to access secured ObjectGrid
            • Use xsadmin to show map size
            • Stop secure server
          3. Java SE security tutorial - Step 3
            • Use of JAAS authorization policy
          4. Java SE security tutorial - Step 4
            • Create a key store and trust store
            • Configure SSL properties for the server
            • Configure SSL properties for the client
            • Use xsadmin to show map size
            • Stop secure server
          1. Java SE security tutorial - Step 1
            This topic describes a simple unsecured sample. Additional security features are added incrementally in the steps of the tutorial to increase the amount of integrated security that is available.
          2. Java SE security tutorial - Step 2
            Building on the previous step, the following topic shows how to implement client authentication in a distributed eXtreme Scale environment.
          3. Java SE security tutorial - Step 3
            After authenticating a client, as in the previous step, you can give security privileges through eXtreme Scale authorization mechanisms.
          4. Java SE security tutorial - Step 4
            The following step explains how you can enable a security layer for communication between your environment's endpoints.
          posted on 2012-06-26 19:29 ゞ沉默是金ゞ 閱讀(824) 評(píng)論(0)  編輯  收藏 所屬分類: eXtreme
          主站蜘蛛池模板: 平罗县| 西安市| 柘荣县| 定结县| 深泽县| 兴海县| 靖宇县| 博爱县| 阳西县| 江北区| 应用必备| 乐山市| 娄底市| 长汀县| 溧阳市| 扶余县| 广宗县| 香格里拉县| 株洲县| 鄂尔多斯市| 论坛| 永兴县| 五寨县| 西林县| 额济纳旗| 类乌齐县| 周口市| 曲麻莱县| 浦城县| 紫金县| 边坝县| 天祝| 安化县| 兴义市| 玉溪市| 丁青县| 皮山县| 贵德县| 镇巴县| 大英县| 蒙山县|