Deck 7: Authentication and Authorization With Java

ملء الشاشة (f)
exit full mode
سؤال
5)PAM modules cannot be stacked together to support "stacked authentication" where an application can use one or more PAM modules for authentication.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
13)The JAAS framework defines the term ____ to represent the requester for a service.

A) resource
B) credential
C) subject
D) principal
سؤال
17)The ____ class is used by SaslServer to determine whether or not one entity can act on behalf of another entity in the SASL environment.

A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
سؤال
19)The ____ class retrieves realm information for SaslClient and SaslServer.

A) ChoiceCallback
B) RealmCallback
C) LanguageCallback
D) AuthorizeCallback
سؤال
2)A good authentication technology should be platform and system dependent.
سؤال
18)The ___ class retrieves the locale used for localizing text.

A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
سؤال
7)____ authentication is usually used with lightweight directory access protocol (LDAP) and Web authentication that transmits credentials across the network as an MD5 hash or message digest.

A) Passport
B) Digest
C) Kerberos
D) NTLM
سؤال
15)The ____ class represents a Java implementation of the PAM framework.

A) CallbackHandler
B) Principal
C) LoginContext
D) Subject
سؤال
12)With ____, authorization is implemented by allowing the administrator to control which users or groups have the right to perform various administrative functions or to take any action that affects systemwide resources.

A) administrative privileges
B) permissions inheritance
C) user-based authorization
D) discretionary access to securable objects
سؤال
6)To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.

A) sniffing
B) surveillance
C) auditing
D) ACL
سؤال
9)The idea of ____ is that all security contexts are linked to a user instead of an application.

A) discretionary access to securable objects
B) permissions inheritance
C) administrative privileges
D) user-based authorization
سؤال
8)____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.

A) Kerberos
B) NTLM
C) LDAP
D) Digest
سؤال
3)Java 2 provides access controls based on where the code originated from and who signed the code.
سؤال
16)To support stacked authentication, each PAM module, using the LoginModule interface, supports the notion of two-phase authentication using the login() and ____ method.

A) commit()
B) logout()
C) submit()
D) reset()
سؤال
10)With ____, authorization is implemented when you control permissions for new objects created in a container object by setting inheritable permissions on the container.

A) user-based authorization
B) permissions inheritance
C) discretionary access to securable objects
D) administrative privileges
سؤال
14)Regarding JAAS, the term ____ is used to represent a name associated with a subject.

A) Subject
B) Resource
C) Credential
D) Principal
سؤال
Without authentication, it is impossible to assure who an entity is and whether or not to authorize any action at all.
سؤال
4)The Java security architecture itself has the ability to enforce authentication, or determining who runs the code, and authorization or determining what actions can be performed.
سؤال
20)The ____ PAM module prompts for a username and password. It then verifies the password against the password stored in a directory service configured using Java naming and directory interface (JNDI).

A) JndiLoginModule
B) KeyStoreLoginModule
C) SolarisLoginModule
D) UnixLoginModule
سؤال
11)____ enables authorization to be self-managed as an object owner can set permissions on all objects she or he created.

A) User-based authorization
B) Permissions inheritance
C) Administrative privileges
D) Discretionary access to securable objects
سؤال
33)Compare one-factor and multiple-factor authentication.
سؤال
38)Briefly describe the Refreshable interface.
سؤال
40)What are the general steps performed when authenticating a Subject in JAAS?
سؤال
31)A Subject can also own security-related attributes. These attributes are called ____________________ in JAAS.
سؤال
37)What are some of the benefits of using pluggable authentication modules?
سؤال
34)Does a "good" authentication technology that is platform/system independent and provides SSO exist today? Explain your answer.
سؤال
22)The ____ PAM module retrieves and makes available Solaris UID/GID/groups information for the current user.

A) NTLoginModule
B) SolarisSystem
C) UnixLoginModule
D) KeyStoreLoginModule
سؤال
24)The Java platform implements the concept of ____ to support thread execution across multiple modules with different context characteristics.

A) least privilege
B) least-common-denominator
C) private credentials
D) privilege credentials
سؤال
39)Briefly describe the Destroyable interface.
سؤال
21)The ____ PAM module provides a JAAS login module that prompts for a keystore alias and populates the subject with the alias's principal and credentials.

A) NTLoginModule
B) SolarisLoginModule
C) UnixLoginModule
D) KeyStoreLoginModule
سؤال
27)____________________ is the assurance that an entity is who it claims to be.
سؤال
28)____________________ is concerned with what an identity is allowed to do.
سؤال
36)What are the main goals of JAAS?
سؤال
41)What are some of the levels that can be set to specify the impact of the success or failure of a given log-in procedure on the overall JAAS authentication procedure?
سؤال
30)Authentication in JAAS is performed in a pluggable and stackable fashion. It is based on a concept called the ___________________ framework.
سؤال
26)In Java, a(n) ____ is used to make system resource access decisions based on the context it encapsulates.

A) AccessController
B) ACLController
C) AccessPolicyContext
D) AccessControlContext
سؤال
23)The ____ PAM module retrieves and makes available Unix UID/GID/groups information for the current user.

A) UnixLoginModule
B) SolarisSystem
C) SolarisLoginModule
D) UnixSystem
سؤال
29)____________________ is a list attached to an object in a system. It consists of control expressions, each of which grants or denies some ability to a particular user or group of users.
سؤال
35)Briefly describe authorization.
سؤال
25)In Java, the ____ class does this comparison. It programmatically checks permissions and obtains the current Subject associated with the active access control context as well.

A) AccessPolicy
B) ACLController
C) AccessController
D) AccessControlContext
سؤال
Match between columns
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Role-based authorization
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Single sign-on
a traditional authentication method for Windows operating systems using a simple challenge response protocol
NTSystem PAM
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Negotiate
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Resource
a traditional authentication method for Windows operating systems using a simple challenge response protocol
NTLM authentication
a traditional authentication method for Windows operating systems using a simple challenge response protocol
PAM
a traditional authentication method for Windows operating systems using a simple challenge response protocol
SASL
a traditional authentication method for Windows operating systems using a simple challenge response protocol
LoginContext
protocol that picks one of the available authentication methods for a system
Role-based authorization
protocol that picks one of the available authentication methods for a system
Single sign-on
protocol that picks one of the available authentication methods for a system
NTSystem PAM
protocol that picks one of the available authentication methods for a system
Negotiate
protocol that picks one of the available authentication methods for a system
Resource
protocol that picks one of the available authentication methods for a system
NTLM authentication
protocol that picks one of the available authentication methods for a system
PAM
protocol that picks one of the available authentication methods for a system
SASL
protocol that picks one of the available authentication methods for a system
LoginContext
the core authentication class in JAAS
Role-based authorization
the core authentication class in JAAS
Single sign-on
the core authentication class in JAAS
NTSystem PAM
the core authentication class in JAAS
Negotiate
the core authentication class in JAAS
Resource
the core authentication class in JAAS
NTLM authentication
the core authentication class in JAAS
PAM
the core authentication class in JAAS
SASL
the core authentication class in JAAS
LoginContext
a framework for authentication and authorization in Internet protocols
Role-based authorization
a framework for authentication and authorization in Internet protocols
Single sign-on
a framework for authentication and authorization in Internet protocols
NTSystem PAM
a framework for authentication and authorization in Internet protocols
Negotiate
a framework for authentication and authorization in Internet protocols
Resource
a framework for authentication and authorization in Internet protocols
NTLM authentication
a framework for authentication and authorization in Internet protocols
PAM
a framework for authentication and authorization in Internet protocols
SASL
a framework for authentication and authorization in Internet protocols
LoginContext
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Role-based authorization
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Single sign-on
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
NTSystem PAM
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Negotiate
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Resource
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
NTLM authentication
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
PAM
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
SASL
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
LoginContext
a place where a number of services are being offered
Role-based authorization
a place where a number of services are being offered
Single sign-on
a place where a number of services are being offered
NTSystem PAM
a place where a number of services are being offered
Negotiate
a place where a number of services are being offered
Resource
a place where a number of services are being offered
NTLM authentication
a place where a number of services are being offered
PAM
a place where a number of services are being offered
SASL
a place where a number of services are being offered
LoginContext
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Role-based authorization
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Single sign-on
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
NTSystem PAM
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Negotiate
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Resource
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
NTLM authentication
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
PAM
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
SASL
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
LoginContext
retrieves and makes available NT security information for the current user
Role-based authorization
retrieves and makes available NT security information for the current user
Single sign-on
retrieves and makes available NT security information for the current user
NTSystem PAM
retrieves and makes available NT security information for the current user
Negotiate
retrieves and makes available NT security information for the current user
Resource
retrieves and makes available NT security information for the current user
NTLM authentication
retrieves and makes available NT security information for the current user
PAM
retrieves and makes available NT security information for the current user
SASL
retrieves and makes available NT security information for the current user
LoginContext
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Role-based authorization
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Single sign-on
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
NTSystem PAM
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Negotiate
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Resource
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
NTLM authentication
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
PAM
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
SASL
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
LoginContext
سؤال
42)Briefly describe the java.security.policy class.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Authentication and Authorization With Java
1
5)PAM modules cannot be stacked together to support "stacked authentication" where an application can use one or more PAM modules for authentication.
False
2
13)The JAAS framework defines the term ____ to represent the requester for a service.

A) resource
B) credential
C) subject
D) principal
C
3
17)The ____ class is used by SaslServer to determine whether or not one entity can act on behalf of another entity in the SASL environment.

A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
B
4
19)The ____ class retrieves realm information for SaslClient and SaslServer.

A) ChoiceCallback
B) RealmCallback
C) LanguageCallback
D) AuthorizeCallback
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
2)A good authentication technology should be platform and system dependent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
18)The ___ class retrieves the locale used for localizing text.

A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
7)____ authentication is usually used with lightweight directory access protocol (LDAP) and Web authentication that transmits credentials across the network as an MD5 hash or message digest.

A) Passport
B) Digest
C) Kerberos
D) NTLM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
15)The ____ class represents a Java implementation of the PAM framework.

A) CallbackHandler
B) Principal
C) LoginContext
D) Subject
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
12)With ____, authorization is implemented by allowing the administrator to control which users or groups have the right to perform various administrative functions or to take any action that affects systemwide resources.

A) administrative privileges
B) permissions inheritance
C) user-based authorization
D) discretionary access to securable objects
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
6)To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.

A) sniffing
B) surveillance
C) auditing
D) ACL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
9)The idea of ____ is that all security contexts are linked to a user instead of an application.

A) discretionary access to securable objects
B) permissions inheritance
C) administrative privileges
D) user-based authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
8)____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.

A) Kerberos
B) NTLM
C) LDAP
D) Digest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
3)Java 2 provides access controls based on where the code originated from and who signed the code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
16)To support stacked authentication, each PAM module, using the LoginModule interface, supports the notion of two-phase authentication using the login() and ____ method.

A) commit()
B) logout()
C) submit()
D) reset()
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
10)With ____, authorization is implemented when you control permissions for new objects created in a container object by setting inheritable permissions on the container.

A) user-based authorization
B) permissions inheritance
C) discretionary access to securable objects
D) administrative privileges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
14)Regarding JAAS, the term ____ is used to represent a name associated with a subject.

A) Subject
B) Resource
C) Credential
D) Principal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
Without authentication, it is impossible to assure who an entity is and whether or not to authorize any action at all.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
4)The Java security architecture itself has the ability to enforce authentication, or determining who runs the code, and authorization or determining what actions can be performed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
20)The ____ PAM module prompts for a username and password. It then verifies the password against the password stored in a directory service configured using Java naming and directory interface (JNDI).

A) JndiLoginModule
B) KeyStoreLoginModule
C) SolarisLoginModule
D) UnixLoginModule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
11)____ enables authorization to be self-managed as an object owner can set permissions on all objects she or he created.

A) User-based authorization
B) Permissions inheritance
C) Administrative privileges
D) Discretionary access to securable objects
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
33)Compare one-factor and multiple-factor authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
38)Briefly describe the Refreshable interface.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
40)What are the general steps performed when authenticating a Subject in JAAS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
31)A Subject can also own security-related attributes. These attributes are called ____________________ in JAAS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
37)What are some of the benefits of using pluggable authentication modules?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
34)Does a "good" authentication technology that is platform/system independent and provides SSO exist today? Explain your answer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
22)The ____ PAM module retrieves and makes available Solaris UID/GID/groups information for the current user.

A) NTLoginModule
B) SolarisSystem
C) UnixLoginModule
D) KeyStoreLoginModule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
24)The Java platform implements the concept of ____ to support thread execution across multiple modules with different context characteristics.

A) least privilege
B) least-common-denominator
C) private credentials
D) privilege credentials
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
39)Briefly describe the Destroyable interface.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
21)The ____ PAM module provides a JAAS login module that prompts for a keystore alias and populates the subject with the alias's principal and credentials.

A) NTLoginModule
B) SolarisLoginModule
C) UnixLoginModule
D) KeyStoreLoginModule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
27)____________________ is the assurance that an entity is who it claims to be.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
28)____________________ is concerned with what an identity is allowed to do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
36)What are the main goals of JAAS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
41)What are some of the levels that can be set to specify the impact of the success or failure of a given log-in procedure on the overall JAAS authentication procedure?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
30)Authentication in JAAS is performed in a pluggable and stackable fashion. It is based on a concept called the ___________________ framework.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
26)In Java, a(n) ____ is used to make system resource access decisions based on the context it encapsulates.

A) AccessController
B) ACLController
C) AccessPolicyContext
D) AccessControlContext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
23)The ____ PAM module retrieves and makes available Unix UID/GID/groups information for the current user.

A) UnixLoginModule
B) SolarisSystem
C) SolarisLoginModule
D) UnixSystem
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
29)____________________ is a list attached to an object in a system. It consists of control expressions, each of which grants or denies some ability to a particular user or group of users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
35)Briefly describe authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
25)In Java, the ____ class does this comparison. It programmatically checks permissions and obtains the current Subject associated with the active access control context as well.

A) AccessPolicy
B) ACLController
C) AccessController
D) AccessControlContext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Role-based authorization
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Single sign-on
a traditional authentication method for Windows operating systems using a simple challenge response protocol
NTSystem PAM
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Negotiate
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Resource
a traditional authentication method for Windows operating systems using a simple challenge response protocol
NTLM authentication
a traditional authentication method for Windows operating systems using a simple challenge response protocol
PAM
a traditional authentication method for Windows operating systems using a simple challenge response protocol
SASL
a traditional authentication method for Windows operating systems using a simple challenge response protocol
LoginContext
protocol that picks one of the available authentication methods for a system
Role-based authorization
protocol that picks one of the available authentication methods for a system
Single sign-on
protocol that picks one of the available authentication methods for a system
NTSystem PAM
protocol that picks one of the available authentication methods for a system
Negotiate
protocol that picks one of the available authentication methods for a system
Resource
protocol that picks one of the available authentication methods for a system
NTLM authentication
protocol that picks one of the available authentication methods for a system
PAM
protocol that picks one of the available authentication methods for a system
SASL
protocol that picks one of the available authentication methods for a system
LoginContext
the core authentication class in JAAS
Role-based authorization
the core authentication class in JAAS
Single sign-on
the core authentication class in JAAS
NTSystem PAM
the core authentication class in JAAS
Negotiate
the core authentication class in JAAS
Resource
the core authentication class in JAAS
NTLM authentication
the core authentication class in JAAS
PAM
the core authentication class in JAAS
SASL
the core authentication class in JAAS
LoginContext
a framework for authentication and authorization in Internet protocols
Role-based authorization
a framework for authentication and authorization in Internet protocols
Single sign-on
a framework for authentication and authorization in Internet protocols
NTSystem PAM
a framework for authentication and authorization in Internet protocols
Negotiate
a framework for authentication and authorization in Internet protocols
Resource
a framework for authentication and authorization in Internet protocols
NTLM authentication
a framework for authentication and authorization in Internet protocols
PAM
a framework for authentication and authorization in Internet protocols
SASL
a framework for authentication and authorization in Internet protocols
LoginContext
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Role-based authorization
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Single sign-on
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
NTSystem PAM
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Negotiate
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Resource
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
NTLM authentication
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
PAM
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
SASL
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
LoginContext
a place where a number of services are being offered
Role-based authorization
a place where a number of services are being offered
Single sign-on
a place where a number of services are being offered
NTSystem PAM
a place where a number of services are being offered
Negotiate
a place where a number of services are being offered
Resource
a place where a number of services are being offered
NTLM authentication
a place where a number of services are being offered
PAM
a place where a number of services are being offered
SASL
a place where a number of services are being offered
LoginContext
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Role-based authorization
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Single sign-on
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
NTSystem PAM
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Negotiate
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Resource
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
NTLM authentication
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
PAM
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
SASL
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
LoginContext
retrieves and makes available NT security information for the current user
Role-based authorization
retrieves and makes available NT security information for the current user
Single sign-on
retrieves and makes available NT security information for the current user
NTSystem PAM
retrieves and makes available NT security information for the current user
Negotiate
retrieves and makes available NT security information for the current user
Resource
retrieves and makes available NT security information for the current user
NTLM authentication
retrieves and makes available NT security information for the current user
PAM
retrieves and makes available NT security information for the current user
SASL
retrieves and makes available NT security information for the current user
LoginContext
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Role-based authorization
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Single sign-on
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
NTSystem PAM
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Negotiate
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Resource
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
NTLM authentication
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
PAM
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
SASL
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
LoginContext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
42)Briefly describe the java.security.policy class.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.