ゞ沉默是金ゞ

          魚離不開水,但是沒有說不離開哪滴水.
          posts - 98,comments - 104,trackbacks - 0

          With the following tutorial, you can create a distributed eXtreme Scale environment in a Java Platform, Standard Edition environment.

          Before you begin

          Ensure that you are familiar with the basics of a distributed eXtreme Scale configuration.

          About this task

          In this tutorial, the catalog server, container server, and client all run in a Java SE environment. Each step in the tutorial builds on the previous one. Follow each of the steps to secure a distributed eXtreme Scale and develop a simple Java SE application to access the secured eXtreme Scale.

          Begin tutorial

          Procedure

          1. Java SE security tutorial - Step 1
            • Start an unsecured catalog server
            • Start an unsecured container server
            • Start a client to access the data
            • Use xsadmin to show map size
            • Stop server
          2. Java SE security tutorial - Step 2
            • Use of CredentialGenerator
            • Use of Authenticator
            • Start a secure catalog server
            • Start a secure container server
            • Start client to access secured ObjectGrid
            • Use xsadmin to show map size
            • Stop secure server
          3. Java SE security tutorial - Step 3
            • Use of JAAS authorization policy
          4. Java SE security tutorial - Step 4
            • Create a key store and trust store
            • Configure SSL properties for the server
            • Configure SSL properties for the client
            • Use xsadmin to show map size
            • Stop secure server
          1. Java SE security tutorial - Step 1
            This topic describes a simple unsecured sample. Additional security features are added incrementally in the steps of the tutorial to increase the amount of integrated security that is available.
          2. Java SE security tutorial - Step 2
            Building on the previous step, the following topic shows how to implement client authentication in a distributed eXtreme Scale environment.
          3. Java SE security tutorial - Step 3
            After authenticating a client, as in the previous step, you can give security privileges through eXtreme Scale authorization mechanisms.
          4. Java SE security tutorial - Step 4
            The following step explains how you can enable a security layer for communication between your environment's endpoints.
          posted on 2012-06-26 19:29 ゞ沉默是金ゞ 閱讀(824) 評(píng)論(0)  編輯  收藏 所屬分類: eXtreme
          主站蜘蛛池模板: 盐边县| 桓台县| 册亨县| 项城市| 东明县| 富宁县| 福州市| 忻州市| 会昌县| 孝感市| 琼结县| 西丰县| 四子王旗| 张家界市| 响水县| 朝阳县| 海兴县| 印江| 科技| 桑日县| 黄石市| 四平市| 台北县| 米易县| 沛县| 宁强县| 邵武市| 天水市| 东乡族自治县| 元氏县| 岳阳县| 故城县| 英山县| 南投市| 青州市| 沅江市| 萨嘎县| 甘洛县| 白河县| 福贡县| 曲水县|