WebSphere eXtreme Scale Product Overview > Tutorials > Tutorials, examples, and samples
Java SE security tutorial - Main page
With the following tutorial, you can create a distributed eXtreme Scale environment in a Java™ Platform, Standard Edition environment.
Before you begin
Ensure that you are familiar with the basics of a distributed eXtreme Scale configuration.In this tutorial, the catalog server, container server, and client all run in a Java SE environment. Each step in the tutorial builds on the previous one. Follow each of the steps to secure a distributed eXtreme Scale and develop a simple Java SE application to access the secured eXtreme Scale.
Procedure
- Java SE security tutorial - Step 1
- Start an unsecured catalog server
- Start an unsecured container server
- Start a client to access the data
- Use xsadmin to show map size
- Stop server
- Java SE security tutorial - Step 2
- Use of CredentialGenerator
- Use of Authenticator
- Start a secure catalog server
- Start a secure container server
- Start client to access secured ObjectGrid
- Use xsadmin to show map size
- Stop secure server
- Java SE security tutorial - Step 3
- Use of JAAS authorization policy
- Java SE security tutorial - Step 4
- Create a key store and trust store
- Configure SSL properties for the server
- Configure SSL properties for the client
- Use xsadmin to show map size
- Stop secure server
- Java SE security tutorial - Step 1
This topic describes a simple unsecured sample. Additional security features are added incrementally in the steps of the tutorial to increase the amount of integrated security that is available.- Java SE security tutorial - Step 2
Building on the previous step, the following topic shows how to implement client authentication in a distributed eXtreme Scale environment.- Java SE security tutorial - Step 3
After authenticating a client, as in the previous step, you can give security privileges through eXtreme Scaleauthorization mechanisms.- Java SE security tutorial - Step 4
The following step explains how you can enable a security layer for communication between the environment's endpoints.
Parent topic
Tutorials, examples, and samples