Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS Podręcznik Użytkownika Strona 11

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 328
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 10
Security System Guide - Table of Contents
xi
Security Measures for Portable-ORB ...........................................................................................2-20
Unauthorized Access to Resource Files..................................................................................2-20
Notes on Communication Data................................................................................................2-20
Notes on Creation and Operation of Java Applet....................................................................2-21
About Authorization Settings ..............................................................................................2-21
About Errors and Exceptions..............................................................................................2-21
Security Measures for Event Service............................................................................................2-22
Unauthorized Access to Resource Files..................................................................................2-22
Security Measures for IJServer Operation ...................................................................................2-23
Unauthorized Access to Resource Files..................................................................................2-23
Notes on IJServer Execution...................................................................................................2-23
Security Measures Concerning Operation of Smart Repository...................................................2-24
About Operation.......................................................................................................................2-24
Blocking External Access.........................................................................................................2-24
Restriction of Services.............................................................................................................2-24
Notes on Accessing the Smart Repository Server ..................................................................2-24
Security Measures for Fujitsu Enabler..........................................................................................2-25
Account Used for Fujitsu Enabler............................................................................................2-25
Measures for Multi server Management.......................................................................................2-26
Security Role Settings .............................................................................................................2-26
Measures for Configuration Manager...........................................................................................2-27
Illegal Access to Resource Files..............................................................................................2-27
Chapter 3 Authentication and Access Control for the Interstage HTTP Server
Types of Authentication...................................................................................................................3-2
User Authentication (Basic Authentication)................................................................................3-2
IP Access Control.......................................................................................................................3-3
Online Collation...............................................................................................................................3-4
Setting the User Authentication ......................................................................................................3-5
Registering a User Password....................................................................................................3-5
Editing the Environment Definition File......................................................................................3-6
Relating Directives.....................................................................................................................3-7
AuthName.............................................................................................................................3-8
AuthType...............................................................................................................................3-8
AuthUserFile.........................................................................................................................3-9
<Directory>...........................................................................................................................3-9
Require ...............................................................................................................................3-10
Setting the IP Access Control .......................................................................................................3-11
Przeglądanie stron 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 327 328

Komentarze do niniejszej Instrukcji

Brak uwag