Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Enterprise JavaBeans™ Specification, Version 2.0 - Sun Microsystems.pdf
Скачиваний:
14
Добавлен:
24.05.2014
Размер:
2.71 Mб
Скачать

Sun Microsystems Inc

Security Interoperability

Enterprise JavaBeans 2.0, Public Draft

Support for Distribution and Interoperability

two servers, then mutual authentication should be required unless there is physical network security.

If the client and server are using certificates for authentication, configure a trusted common certificate authority for both client and server. If using Kerberos, configure the client and server with the same KDC or cooperating KDCs.

Configure a restricted list of trusted server principals that a client container is allowed to interact with, to prevent the client’s private credentials such as password from being sent to untrusted servers.

18.7.2.4Run time behavior

Client containers should determine whether to use SSL for an enterprise bean invocation by using the security policies configured by the client administrator for interactions with the target host or enterprise bean, and the “ target_requires” information in the security tagged components in the target enterprise bean’s IOR. If either the client configuration requires secure interactions with the enterprise bean, or the enterprise bean requires secure communication, the client should initiate an SSL connection to the server. The client must follow the rules described in the CSIv2 submission for including security context information in IIOP messages.

When an EJB container receives an IIOP message, its behavior depends on deployment time configuration, run-time information exchanged with the client at the SSL layer, and principal/authentication data propagated in the IIOP message service context. EJB containers are required to follow the protocol rules prescribed by the CSIv2 submission.

377

5/31/00

Sun Microsystems Inc.

Support for Distribution and Interoperability

Enterprise JavaBeans 2.0, Public Draft

Security Interoperability

5/31/00

378