ゞ沉默是金ゞ

          魚離不開水,但是沒有說不離開哪滴水.
          posts - 98,comments - 104,trackbacks - 0

          With the following tutorial, you can create a distributed eXtreme Scale environment in a Java Platform, Standard Edition environment.

          Before you begin

          Ensure that you are familiar with the basics of a distributed eXtreme Scale configuration.

          About this task

          In this tutorial, the catalog server, container server, and client all run in a Java SE environment. Each step in the tutorial builds on the previous one. Follow each of the steps to secure a distributed eXtreme Scale and develop a simple Java SE application to access the secured eXtreme Scale.

          Begin tutorial

          Procedure

          1. Java SE security tutorial - Step 1
            • Start an unsecured catalog server
            • Start an unsecured container server
            • Start a client to access the data
            • Use xsadmin to show map size
            • Stop server
          2. Java SE security tutorial - Step 2
            • Use of CredentialGenerator
            • Use of Authenticator
            • Start a secure catalog server
            • Start a secure container server
            • Start client to access secured ObjectGrid
            • Use xsadmin to show map size
            • Stop secure server
          3. Java SE security tutorial - Step 3
            • Use of JAAS authorization policy
          4. Java SE security tutorial - Step 4
            • Create a key store and trust store
            • Configure SSL properties for the server
            • Configure SSL properties for the client
            • Use xsadmin to show map size
            • Stop secure server
          1. Java SE security tutorial - Step 1
            This topic describes a simple unsecured sample. Additional security features are added incrementally in the steps of the tutorial to increase the amount of integrated security that is available.
          2. Java SE security tutorial - Step 2
            Building on the previous step, the following topic shows how to implement client authentication in a distributed eXtreme Scale environment.
          3. Java SE security tutorial - Step 3
            After authenticating a client, as in the previous step, you can give security privileges through eXtreme Scale authorization mechanisms.
          4. Java SE security tutorial - Step 4
            The following step explains how you can enable a security layer for communication between your environment's endpoints.
          posted on 2012-06-26 19:29 ゞ沉默是金ゞ 閱讀(819) 評論(0)  編輯  收藏 所屬分類: eXtreme
          主站蜘蛛池模板: 五台县| 文登市| 雅江县| 琼结县| 集安市| 东乡县| 揭西县| 商水县| 辰溪县| 东山县| 比如县| 江永县| 海伦市| 高碑店市| 达拉特旗| 鄯善县| 丰顺县| 和林格尔县| 昆山市| 镇巴县| 信丰县| 乃东县| 科技| 昌宁县| 永定县| 大关县| 疏附县| 桐庐县| 福安市| 昌邑市| 宜城市| 类乌齐县| 新巴尔虎右旗| 宣化县| 昌图县| 特克斯县| 玉屏| 新龙县| 高州市| 朝阳市| 阜新|